Welcome!

Jess Richter

Subscribe to Jess Richter: eMailAlertsEmail Alerts
Get Jess Richter via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jess Richter

Every cloud infrastructure can be home to potentially hundreds of thousands of vulnerable privileged accounts. The presence of automated hacking tools means improperly secured privileged logins are almost certain to give hackers free reign on the network and access to customers' private data, within minutes of an incursion. Until now privileged accounts and other file-based secrets have proven difficult to secure within large-scale, dynamic Cloud Service Provider (CSP) networks, and many still use humans and first-generation software tools to manage the task. As a result, improperly secured privileged accounts provide an easily exploited attack surface for hackers and malicious insiders. Key Security Concerns for Cloud Service Providers The problem with improperly secured privileged accounts is a particular concern for cloud providers. CSPs face significant problem... (more)