privileged accounts
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Protecting your organization against privileged identity theft
What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
How privileged insiders threaten the security of global organizations
A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Security overconfidence and immaturity continue to endanger organizations
The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. …
![Outlook](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094623/outlook-400x200.jpg)
Hackers used credentials of a Microsoft Support worker to access users’ webmail
On Friday, an unknown number of customers of Microsoft’s webmail services (Outlook.com, Hotmail, MSN Mail) received a notice from the company telling them that attackers …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
85% of organizations fail to meet even basic PAM security hygiene
While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Privileged credential abuse is involved in 74% of data breaches
Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Is Privileged Access Management still a pain?
Every week seems to bring the story of a new customer data breach, but regardless of the individual details, the majority of incidents have one trait in common. The chances …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112722/tunnel-400x200.jpg)
How companies continue to expose sensitive data to threats
A new study from the Varonis Data Lab found that on average, 21% of a company’s folders were accessible to every employee, and 41% of companies had at least 1,000 sensitive …
![editor](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101601/editor2-400x200.jpg)
Privilege escalation on Unix machines via plugins for text editors
Several of the most popular extensible text editors for Unix environments could be misused by attackers to escalate privileges on targeted systems, SafeBreach researchers have …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104734/windows-400x200.jpg)
Hijacking Windows user sessions with built-in command line tools
Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD