Securing DevOps

Manisha Rai, IAM Consulant, SecureITsource, Inc. With business demanding faster delivery of quality applications, the interest in Devops is growing. Many organizations have adopted DevOps methodologies to accelerate the pace of innovation. According to a survey published in January 2016 … Continued

Is Perfect Security Possible?

Mike Winslow, Senior Consultant, SecureITsource, Inc. Years ago, I heard someone say that the only way to perfectly secure a server was to dig a hole, put the server in, and then fill it with cement. Extreme? Yes. Practical? No. … Continued

Future of Credential Theft

Josh Raduka, Senior Consultant, SecureITsource, Inc. Over the past few years, we have seen countless organizations suffer from cyber-attacks that led to headline breaking data breaches. The majority of organizations, ranging from all areas of the spectrum including financial and … Continued

Access Governance under GDPR

Mike Campbell, Senior Consultant, SecureITsource, Inc. The General Data Protection Regulation, or GDPR, is an information security regulation coming into effect on May 25th, 2018 for all companies dealing with customers in the EU. It requires companies to put in … Continued

Mitigate popular service account attacks with these best practices

Chris Underwood, Senior Consultant, SecureITsource, Inc. Last year I wrote a short article about group managed service accounts, a great mitigation against LSASS dumps and Kerberoasting. Mitigating these two attacks are still entirely possible without use of GMSAs when service account best practices … Continued

Behavioral Biometrics: Convenient Security

Zack Zando, Senior IAM Consultant, SecureITsource, Inc. When was the last time you walked into a bank to make a transaction? Whether it was depositing a check, transferring funds, sending money to a friend – it’s likely that the way … Continued

Conjur: Machine Identity & DevSecOps

Peter Greenwood, PAM Practice Team Lead, SecureITsource, Inc. secureITsourceLABS is the culmination of numerous initiatives, client use case demonstrations, and proprietary processes built by our team over time. We are laser focused on delivering best-of-breed identity and privileged identity solutions … Continued

Protecting Privileged Accounts

Manisha Rai, IAM Consultant, SecureITsource, Inc. 2017 has been yet another year beset by a number of massive data breaches! In fact, it is more than likely you have not just heard about them, but it’s very possible that you … Continued