Quantcast
Channel: Vulnerability Management – PathMaker Group
Browsing latest articles
Browse All 19 View Live

Target Data Breach

How did they pull it off and how can you safeguard your environment from a similar event? The Target Stores data breach started by exploiting a vulnerability in an externally facing webserver.  Once...

View Article



A Sobering Day for All CEOs

Sadly, the CEO presiding over Target during the recent data breach resigned today.  See USA today article. This series of unfortunate events for Target begs a key question relating to the risks every...

View Article

Image may be NSFW.
Clik here to view.

Oracle Identity and Access Management with EM12c: Red Pill or Blue Pill?

It seems all too often that when users are unable to access an end-user business function protected by a IDAM (Identity and Access Management) solution, the IDAM system gets the brunt of the blame and...

View Article

Leadership Essential in Cybersecurity Dynamics

Are your C-level leaders sending a clear message about Cyber Security? Despite the high profile security breaches making news headlines and increased attention around cyber risks, executives in the...

View Article

With today’s increasing Mobile Enterprise Security Threats, do you have a...

Corporations are increasingly utilizing mobile enterprise systems to meet their business objectives, allowing mobile devices such as smart phones and tablets to access critical applications on their...

View Article


Image may be NSFW.
Clik here to view.

Start With The End In Mind: Blog #6 – Eliminate Audit Deficiencies and...

(Source: SailPoint Technologies, Inc. Identity and Access Management Buyers Guide) Identity management is a focal point for IT audits and one of the areas most commonly flagged for ineffective...

View Article

Image may be NSFW.
Clik here to view.

Five Ways To Spot a Phishing Email

Think you’re clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we’ve put together this list of clues to...

View Article

Image may be NSFW.
Clik here to view.

Why All The Emphasis On Insider Threats? Three Reasons:

1. Insider security risks are more prevalent and potentially more damaging. According to a study conducted by the Ponemon Institute, 34% of data breaches in the U.K., come from malicious activity,...

View Article


Full Report – 2019 Data Breach Investigations Report (Verizon)

Please access your full report here. 2019-data-breach-investigations-report

View Article


Image may be NSFW.
Clik here to view.

How To Instantly See Privileged Account Compromise Or Abuse

IT and System Admins along with security professionals know that safeguarding access to privileged accounts throughout an enterprise is critical. With up to 80% of breaches involving a compromised...

View Article
Browsing latest articles
Browse All 19 View Live




Latest Images