logo
April 11, 2024 | Martin Cannard

Zero Trust vs. Least Privilege

Zero Trust and the Principle of Least Privilege are security models designed to improve security posture by restricting unnecessary access to systems and data. Both models are a reliable way to limit access to resources and tighten your security measures. The Difference Between Zero Trust and...
March 20, 2024 | Martin Cannard

5 Steps to Auditing Administrator Access Rights

Accounts with administrative and elevated privileges are necessary for both business and IT functions, but they represent a significant risk to your organization. In the hands of a careless or malcontent insider or an adversary, privileged credentials open the door to data breaches, infrastructure...
December 18, 2023 | Martin Cannard

Steps to Control Local Admin Rights

IT pros need local admin rights on corporate devices to install software, modify configuration settings, perform troubleshooting and so on. But all too often, business users are also routinely granted local admin rights on their computers. While giving users these rights can be convenient, it...
January 10, 2022 | Joe Dibley

PACRequestorEnforcement and Kerberos Authentication

During the November 2021 Patch Tuesday, Microsoft released new security updates for Kerberos. They include new system events and new structures in the Kerberos Privileged Attribute Certificate (PAC). Let’s look see what impacts these updates may have on operations and Kerberos ticket-based...
December 2, 2021 | Jeremy Moskowitz

AppLocker Pros, Cons, and Alternatives

AppLocker is an application control feature found in enterprise editions of Windows. The tool enables you to manage which applications and files users can run. Windows AppLocker aims to limit software access and related data from specific users and business groups. The results of which is...
September 8, 2021 | Martin Cannard

Just-in-Time Administration for Secure Access Management

Although external cybersecurity attacks and malware make for sensational headlines, the biggest security threat most organizations face comes from trusted insiders with privileged access to sensitive data. Cybersecurity Insider's 2020 Insider Threat Report reveals that 68% of organizations report...
August 25, 2021 | Martin Cannard

Why Zero Standing Privileges Is a Better Approach to Privileged Access

Admin rights are a double-edged sword: While IT pros require elevated rights to do their jobs, those privileges can be misused by the admins themselves — as well as abused by adversaries who have compromised their accounts. The first step in defending against these risks is fairly...
December 3, 2019 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
April 30, 2019 | Farrah Gamboa

What is the Principle of Least Privilege?

One of the most basic things an organization can do to mitigate the risk of a security breach is implement the principle of least privilege (POLP). Read this blog to learn what POLP is and how you can use this principle to strengthen your security posture. The Principle of Least Privilege...
...