Apono Enhances Platform Enabling Permission Revocation and Automated Access

November 21, 2024 at 05:36PM Apono has updated its Cloud Access Platform, allowing automatic discovery and revocation of standing access to enhance security across cloud environments. This update supports Just-in-Time, Just-Enough access, reducing vulnerabilities while maintaining operational efficiency. In-person demonstrations will be held at AWS re:Invent from December 2-6. Visit www.apono.io for details. ### Meeting … Read more

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

November 19, 2024 at 07:49AM Organizations must evolve their approach to Privileged Access Management (PAM) by prioritizing security over merely managing access. With advanced cyber threats emerging, adopting a proactive strategy that includes continuous monitoring, real-time threat response, and robust security controls is essential to effectively protect privileged accounts and sensitive systems. ### Meeting Takeaways: … Read more

Apono Raises $15.5M Series A Funding for AI-driven, Least Privilege Solution Set

October 1, 2024 at 04:55PM Apono, a privileged access leader for the cloud, has successfully completed its Series A funding round, securing $15.5 million. The funding, led by New Era Capital Partners, will advance Apono’s mission of providing AI-driven, innovative, and secure solutions for managing access in complex cloud environments. The investment reflects strong confidence … Read more

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

September 27, 2024 at 10:21AM Government agencies from the Five Eyes countries have provided guidance on threat actor techniques targeting Microsoft Active Directory. These techniques exploit the directory’s vulnerabilities, making it a prime target for bad actors. The guidance recommends prioritizing privileged access security and implementing a tiered model. It also outlines common compromise techniques … Read more

Redesigning the Network to Fend Off Living-Off-the-Land Tactics

February 23, 2024 at 02:25PM Attackers are increasingly using legitimate tools, making it challenging for enterprise defenders to detect and defend against attacks. Rethinking network architecture is essential, with a focus on strong access controls, privileged behavior monitoring, and cloud security technologies. Organizations should prioritize telemetry sources and take a proactive approach to detect living … Read more

Looted RIPE Credentials for Sale on the Dark Web

January 31, 2024 at 01:41PM RIPE, the database for IP addresses, has been targeted by attackers stealing credentials, leading to network intrusions and incidents like Orange Spain’s internet outage. Resecurity found 716 compromised RIPE customers and 1,572 across other regional networks. Stolen credentials from RIPE were also used to target network engineers and privileged users. … Read more

Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management (PAM) Solution to the Cloud

December 5, 2023 at 06:55PM Keeper Security’s report highlights IT leaders’ preference for cloud-based over on-premises Privileged Access Management (PAM) solutions due to cost and complexity concerns. 82% favor moving PAM to the cloud for better security and efficiency. The report also emphasizes the need for zero-trust and zero-knowledge cybersecurity in the current economic climate. … Read more

The Latest Delinea Secret Server Release Boosts Usability With New Features

December 1, 2023 at 05:34PM Delinea announced new features for its Secret Server to enhance usability and facilitate Privileged Access Management adoption. Improvements include a Web Password Filler, enhanced Connection Manager, and mobile app updates for secure, convenient access to privileged credentials, addressing the balance between risk, security, and productivity. Meeting Takeaways: 1. Delinea has … Read more