Profile cover photo
Profile photo
Lieberman Software
46 followers -
Providing proactive privileged identity management and cyber defense for the multi-platform enterprise.
Providing proactive privileged identity management and cyber defense for the multi-platform enterprise.

46 followers
About
Lieberman Software's posts

Post has attachment
Hajime Malware Infects Tens of Thousands of IoT Devices bit.ly/2ovhepj


Post has attachment
The State Of IoT Security, According To The IT Pros: http://bit.ly/2pRWauf

The survey queried respondents about changing default passwords on IoT devices. More than half admitted they do not have a process to change these passwords.

Read more on the blog: http://bit.ly/2pRWauf 

Post has attachment

Post has attachment
Attend the Secure Application Launcher Webinar!: http://bit.ly/2nI3bMR

Learn how to configure virtually every on-premises and cloud-based application for secure, automated login. http://bit.ly/2nI3bMR
Photo

Post has attachment
Five Secrets Of Enterprise Password Management: http://bit.ly/2nEglKw

Many organizations do not properly manage their credentials, exposing themselves to untold risk. Here are 5 secrets of enterprise password management: http://bit.ly/2nEglKw 

Post has attachment
If you’re at InfoSec World, please attend our presentation: “3 Ways to Use PIM & Process to Pump Up the Respond Side of Detect & Respond” 
Photo

Post has attachment
Is Cloud Computing Leading To Poor Security Practices? http://bit.ly/2mMKQ5v

The cloud is just the same technologies from an on-premises environment running somewhere else. Any risks you had on-premises are still there in the cloud.

Read more on the blog: http://bit.ly/2mMKQ5v

#cloud #security #ITSecurity #cybersecurity

Post has attachment
Announcing our Interoperability with RSA Identity Governance and Lifecycle mwne.ws/2nsRJYk

Post has attachment

Post has attachment
The Administrative Credentials Security Hole: http://bit.ly/2nKuQ0E

Did you know that almost anyone with a bit of initiative can break into your systems in minutes – quietly and without leaving a trace?

Even when you lock up your servers, apply patches, and use group policies to secure your servers and workstations, it only takes a few minutes for a hacker to gain the keys to the IT kingdom: administrator passwords.

Read the full post here: http://bit.ly/2nKuQ0E

#cybersecurity #security #infosec #ITSecurity

Wait while more posts are being loaded