Remove Accountability Remove Digital transformation Remove Passwords Remove System Administration
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. This applies to established companies migrating to cloud infrastructure as well as to digital native startups. Related: How ‘PAM’ improves authentication.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. Some context: privileged accounts first arose 20 years ago as our modern business networks took shape. A few key takeaways: How SMBs got here.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Turns out it was possible for a threat actor to flood GLIBC with data , take control of it, and then use it as a launch point for stealing passwords, spying on users and attempting to usurp control of other computers. Privilege account credentials are widely available for sale. This is where PowerShell comes back into play.

Hacking 212