The Privileged Access Blog
The Migus Group’s blog covering identity and access management, PAM, DevSecOps, IT operations and other topics related to enterprise security.
How To Secure Your Business With a Privileged Identity Management Solution — November 29, 2022
Privileged identity management, or PIM, gives IT administrators the ability to control, manage and monitor the access privileges that users have to critical resources within an organization.
4 Uses for Cybersecurity Risk Assessments — November 14, 2022
Cybersecurity risk assessments are used to identify your most important data and devices, how a hacker could gain access, what risks could crop up if your data fell into the wrong hands, and how vulnerable your organization would be as a target.
MFA-Enabled vs. Enforced: Which Works Best for Your Company? — November 8, 2022
Is there a difference between MFA enabled vs. enforced? Learn which multifactor authentication approach works best for your company.
5 Active Directory Alternatives — November 1, 2022
Does your access management system feel outdated? Discover five Active Directory alternatives that improve workflows and reduce costs.
Identity and Access Management Tools to Keep in Your IT Toolkit — October 18, 2022
Considering IAM? We’ve compiled a list of some of the best identity and access management tools that we work with and provide useful information on each of them for you.
An Overview of IAM Security — October 11, 2022
IAM security is a framework of processes, policies and systems that manage digital identities in a highly secure, streamlined manner.
How Zero Trust Network Access Improves Security — October 3, 2022
A newer security concept known as zero trust network access (ZTNA) hides the network location — the IP address — and instead uses identity-based authentication to establish trust and provide access. As a result, ZTNA provides centralized control and improved flexibility to secure highly distributed IT environments.
IAM vs. PAM: What Can They Do for Your Business? — September 20, 2022
IAM and PAM are two types of access-management strategies that organizations use to manage authentication and authorization at scale. However, while similar, these products serve very different functions within an enterprise IT environment.
How To Secure Your Credentials With a PAM Solution — September 13, 2022
Identifying a PAM solution is a strategy to secure, control and monitor access to an organization’s critical information and resources.
How To Choose the Best MFA Solution for Your Business — September 6, 2022
MFA is a security strategy requiring multiple methods of authentication of a user’s credentials in order to verify that user’s identity for a login or other type of access. Identifying the best MFA solution for your business is crucial.
Why MFA Is the Key to Securing Small Businesses — August 30, 2022
Unfortunately, the benefits of multi-factor authentication are not as widespread among SMBs, who are increasingly vulnerable to cyberattacks.
What Is FIDO2, and How Does It Work? — August 23, 2022
FIDO2 is the umbrella term for an open standard for authentication that does not rely on passwords.
MFA vs. 2FA: What’s the Difference? — August 16, 2022
Because single-factor authentication has proven to be relatively easy to compromise, two-factor authentication (2FA) and multifactor authentication (MFA) have emerged as more secure options. Read on to learn about common authentication types, the differences in MFA vs. 2FA and more
Why Every Leader Should Understand Zero Standing Privilege — August 9, 2022
Zero standing privilege (ZSP) is a security policy that no users should be pre-assigned any administrative account privileges. Instead, with ZSP, users’ privileges are assigned at the moment of the attempt to authenticate — not beforehand and not by default.
Universal 2nd Factor (U2F): The Importance of Security Keys — August 3, 2022
Universal 2nd Factor (U2F) is a physical authentication device that uses encryption and private keys to protect and unlock supported accounts. Read on to understand their significance
5 Best Practices of Open-Source Management — July 19, 2022
Open-source management essentially means keeping the project up to date so that it is compatible with the latest version of the various third-party libraries, frameworks and software that it uses. It’s equally important to be mindful of good, strong security measures.
Authentication vs. Authorization: What’s the Difference? — July 12, 2022
Though used interchangeably (and erroneously), authentication and authorization are separate but related steps in the user access provision process. Read on for a thorough comparison of authentication vs. authorization.
What is open-source software? It offers many advantages to businesses: a quicker pace of innovations, strong support from a large and enthusiastic community, and freedom from vendor lock-in.
2FA: Benefits of Two-Factor Authentication — June 28, 2022
2FA is a vital security tool for organizations to defend themselves against cyberattacks that have grown in both quantity and sophistication. Read on to learn about the benefits of two-factor authentication
Understanding Privileged Access Management — April 18, 2022
Privileged access management is a strategy incorporating policies and processes for the provisioning and monitoring of elevated access to critical resources within the enterprise in order to improve enterprise security.
The Top 16 Cybersecurity Terms To Know To Secure Your Business — March 31, 2022
While a cybersecurity program is important to protect your company’s devices, apps and data, it’s worth your while to first understand common cybersecurity terms (and the IT industry in general).
What Is a Cybersecurity Program, and Why Does My Company Need One? — March 18, 2022
A cybersecurity program is a strategy to protect an organization’s data, applications, end points and networks. For many companies, these are the most important assets; therefore, a breach could have damaging and far-reaching consequences.
Zero Standing Privilege — July 20, 2021
Zero Standing Privilege helps reduce the risk of a data breach and hacked accounts/systems by ensuring no one has automatic trust, and that trust (and privilege) is only granted for the length of time needed to perform the task.
Helping Thycotic Deliver Kubernetes Integrations — July 14, 2020
The Migus group is pleased to announce our partnership with Thycotic, in which we helped deliver Kubernetes and key integrations, and SDKS for their Privileged Access Management solutions.