Alpha Generation Distribution Ltd is a 4SEC Group Company
Follow us on Twitter Follow us on LinkedIn
Call us on: 01777 852222

Articles by "Stacey Logan, Author at Alpha Generation Distribution"

PAM beyond basics

Published:

It’s time to take PAM beyond the basics

Does your PAM really control your risk? Covering people, processes and technology – and the complex interplay between them – the latest guide from PAM experts goes beyond the basics and explains why implementing advanced PAM is the only way to control risk effectively.


Cyber-security is an Opportunity, Not Just a Burden

Published:

Cyber Security is an Opportunity, Not Just a Burden

If you’re concerned about the role and reputation of IT security in your business, download your free Thycotic CISO Survey Report to learn how IT security is really perceived and what needs to change to keep your organisation secure.


Implementing Least Privilege

Published:

Enforcing Least Privilege from a Position of Zero Trust

Conventional cybersecurity was based on some key assumptions about threats and where they come from. Inside your network and your business, that’s the safe zone where you can be trusting. Outside your network, that’s the places where attacks come from. Start your least privilege cybersecurity journey here.


SAM

Published:

When is it SAM and when is it a SHAM?

Too often we meet SAM experts that don’t attempt to prevent licensing problems. Instead, they prefer to deal with them after they’ve happened. It can cause high expense, disruption to the business and identify issues when it’s too late. Wouldn’t it be better to prevent these problems by getting it right the first time?


Is Your Estate Secure

Published:

The Real Reason Your Estate Isn’t Secure

Unawareness is an obvious obstacle to improving your security. If you don’t know there’s a risk, you’ll never eliminate it. See how to make an informed decision about your security with The Forrester Wave: PIM Q4 2018 Report – Your guide to Privileged Identity Management.


Keeping Technology Secure

Published:

4 Tough Realities About Keeping your Technology Secure

We live in an imperfect world. It’s a place where cyber criminals target unsuspecting businesses to steal data, disrupt services and even extort money. A place where your technology is always under attack and risk is ever-present. Why, then, would anyone expect cyber security to be perfect?


Least Privilege Adoption

Published:

The fundamentals of successful least privilege adoption

Avoid the common pitfalls that get in the way of Least Privilege Adoption with Thycotic’s latest eBook. You’ll get a complete guide to what constitutes best practice and where even the best-intentioned programmes fall apart. Now is the time to make your least privilege implementation a success.


Real Time DDoS

Published:

Why every business needs real time DDoS protection

When a business slows you down, or can’t deliver at the speed you want, frustration levels soar. The repercussions in terms of customer experience and lost business can be huge. And the same rules apply in the digital world, whenever your employees or customers need to interact with your technology.


Incident Response

Published:

Why You Need a Response Plan for Privileged Account Incidents

In the average organisation, you probably have very clear plans and processes for a range of worst-case scenarios. From fire to natural disaster, there’s a structured response in place – a strategy for keeping your people safe and getting back to business faster.


Sustainable SAM

Published:

How to Achieve Sustainable SAM

The dynamic, ever-changing nature of most software inventories makes effective SAM hard to maintain. Using the ISO 19970-1:2017 ITAM model, the specialists at Astute Licensing have developed a model for sustainable SAM which reduces risk consistently and continually.


Tackling Licence Overspend

Published:

Five Strategies for Tackling Licence Overspend

Like every area of business, IT is always about balancing outcomes against costs. From your applications to your network hardware, every expense needs to be justifiable and deliver real value to the business. But that’s harder to achieve than it sounds.


User Access Control - PAM

Published:

PAM Isn’t Just About User Access Control

From regulations to best-practice schemes like Cyber Essentials, there’s a lot of pressure for businesses to improve their cyber security posture. Thycotic’s report explores the major Cyber Essentials requirements and how better PAM plays an important role in achieving certification.


Two Sides SAM

Published:

The Two Sides of Software Asset Management

When you think about Software Asset Management, there’s a good chance you’re thinking of tools designed to find software, check against licenses, and maintain your compliance. But that’s just part of the picture.


Good Security Secret

Published:

Why Good Security Is About More Than Strength

In security, we’re always looking for ways to make our layers of protection stronger. The biggest challenges for IT managers isn’t finding good security that works, it’s getting users to follow correct processes to make good use of the protection you’re providing.


Storing Passwords

Published:

Why Storing Passwords in Excel is Risky Business

Using Excel as a means of storage and password sharing creates an entirely new risk to your data and systems. In effect you’re creating a useful centralised source of all your account credentials you’d rather keep secret.


SAM - Reactive Approach to Software Leaves You Exposed

Published:

How a Reactive Approach to Software Leaves You Exposed

While SAM and ITAM tools are valuable, they’re incomplete. The only way to eliminate the risk of a costly true-up is to proactively eliminate non-compliance at the source.

Find out more about Astute Licensing and how you can reduce your software licencing risk.


Privileged Account Hack

Published:

How Attackers Use Your Privileged Accounts

With attackers spending up to 90% of their time analysing your network, your business and your employees, here’s how protecting your privileged accounts must be your number one priority.

Find out more about how privileged account hacks work – and what you can do to lower your risk.


Privileged Password Security Certification Training Course

Published:

Why Knowledge is Power In PAM

Privileged accounts remain the number one target for hackers and malicious insiders alike. Keeping them secure is all about knowledge and understanding.

Responsible for protecting IT security? Get PAM certified in 60 minutes with Thycotic’s Privileged Password Security Training Course.


Privileged Account Management 2018 Report

Published:

Where Privileged Account Management is Really Failing

70% of organisations don’t know about all their privileged accounts, and 40% do nothing at all to discover these accounts.

Read Thycotic’s 2018 Global State of PAM Risk & Compliance Report to see where your password security is weakest – and what you need to do about it.


Memcached Kill Switch

Published:

Corero Discovers Memcached DDoS Kill Switch

With the Corero SmartWall Network Threat Defense System, Corero customers have been benefitting from real-time Memcached attack protection since the very first attacks. In less than two seconds, Smartwall can detect and deflect malicious traffic.


Changing Perceptions of Cybersecurity in the Workplace

Published:

Changing Perceptions of Cybersecurity in the Workplace

For too long, cybersecurity has been perceived as a problem that can easily be solved with the right information and technology. However, as attacks become more widespread and more sophisticated, that perception needs to change, especially in the workplace.


How PAM Supports Your GDPR Compliance

Published:

How PAM Supports Your GDPR Compliance

The clock is ticking for GDPR. If you haven’t already, now is the time to look at your business and see how you can keep personal data safe.

Here’s how having Privileged Account Management will help you understand your current position and what needs changing.


Who's Really Responsible For Cybersecurity

Published:

Who’s Really Responsible for Cybersecurity?

With so many of us eager to pass responsibility when it comes to cybersecurity, the truth is that only one person is responsible. That’s you.

Thycotic have created a free eBook, Cybersecurity for dummies that explains everything you need to know and do to stay secure.