decode the role of PAM in modern IT environments

The Changing Landscape of Privileged Accounts Security

Paul Fisher and Anil Bhandari decode the role of PAM in modern IT environments

ARCON and KuppingerCole met once again for an exclusive webinar! Held on 3rd November 2020, this webinar was presented by the two stalwarts of modern IT security: Paul Fisher, Lead Analyst, KuppingerCole Analysts AG and Anil Bhandari, a Thought leader and Chief Mentor, ARCON. In this hour-long session, the essence of a robust Privileged Access Management (PAM) solution was discussed in detail. Unmonitored privileged accounts are the major source of data breaches and malicious actors always try to exploit the security vulnerabilities in and around privileged identities.

Read More

Data Protection In The Age Of The Remote Working Environment

Data Protection in the Age of the Remote Working Environment

It wouldn’t be wrong to state that data has become the most crucial aspect of every organization nowadays. But with this increasing importance of information, its security has also transformed into a concerning factor. To ensure the data remains safe from any breaches, all the companies undertake different security measures on their office networks.

 

This set-up was successful until the remote working environment came into practice. With people working from their own places, organizations have lost control over networks’ security because everyone uses a different system. It gave the intruders a great opportunity, as they can quickly get access to the company’s confidential information.

In order to avoid this, new-age security measures and standard security compliance came into the role. Let’s see the importance of high data security today and how can we achieve it.

Read More

Importance of Information Security in CSR

What is CSR?

The concept of Corporate Social Responsibility (CSR) was first discussed in the 1950s though it was widely acknowledged much later during the late 1990s. The core idea of CSR is to integrate business with responsibilities towards our society and environment. CSR, in this way, is considered as the most convincing way to achieve a balance between economic, environmental and social imperatives while at the same time addressing the expectations of shareholders and stakeholders. Organizations try to enhance the reputation of a company with active CSR, although the concept of CSR goes beyond that.

Read More

Disruptive Technologies Have Changed the World but Also Increased Risks

Disruptive technologies such as Internet of Things (IOTs) and cloud computing have created enormous opportunities for global organizations. They have changed the way global corporations conduct business. According to the Australian government, disruptive technologies could generate up to $625 billion through economic activities every year by 2030 in the Asia-Pacific (APAC) region alone.

While disruptive technologies create new opportunities they also make IT assets vulnerable. Indeed, with tons of data stored in cloud, organizations risk data breach from malicious outsiders.

Read More

Recent Bank Heists: Why to Compromise Critical IT Assets?

A $101 million bank heist, earlier this year, brought the issue of cybersecurity to the forefront once again. In a sophisticated operation, cybercriminals robbed the Central Bank of Bangladesh by getting hold of SWIFT (society for Worldwide Interbank Financial Telecommunication code), the access code for global cross-border payment messaging system.

More important, it wasn’t an isolated case. Even as the dust over Bangladesh bank incident had not settled, the global banking system was again taken aback. This time it was an Ecuador bank, which was hit by a $12 million cyber-heist. The modus operandi was same.

Read More

Data like water

is data like water?

Data like water is an interesting analogy, It was only during one of my vacations that along a beach, i realized how the two are really similar and especially in the world of technology how data flow is akin to water flow. This paper tries to establish similarities, one’s ability to capture and track source. Further how identities are critical and how data can be tagged to various users. Also it is critical to examine the storage and linkages to the identities under which data is stored.

how important is data

Read More

A Billion Dollar Hack: – How hackers exploited Unprotected Privileged Accounts

Summary: How the Carbanak hacker’s group stole a billion dollars without getting caught and what we

learn from it.

The financial world and the security industry have been rocked by the recent report from Kaspersky about the cyber-criminals that have stolen more than $1 Billion from global banks through cyber-attacks. The initial reports link the attacks to a multinational criminal group, and highlight the use of sophisticated malware, dubbed Carbanak.

Read More