Q&A with Marina Simakov, security researcher at Preempt TPG: What can organizations do to best protect their organizations now that the bulk of employees are working remotely? MS: Many organizations may have covered the fundamentals of user authentication and security by defining privileged accounts, enforcing restricted access to crown jewel assets, and reducing the attack…

Read More

Do you know where your organization’s secrets are kept? The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management can be a top challenge. Knowing where secrets are kept in the company is critical – and sometimes easier…

Read More

As I head back from the 1st annual Thales HSM User Group (HUG) conference in Chicago, I have been reflecting on the sessions and information that was shared at the conference. There is a ground swell of awareness around information protection and identity assurance. What was once the theoretical concepts of corporate espionage and dark…

Read More