The Privileged Access Blog

The Migus Group’s blog covering identity and access management, PAM, DevSecOps, IT operations and other topics related to enterprise security.

Why SBOM Management Is Critical — February 21, 2023

A software bill of materials (SBOM) is critical to incident response planning. Learn what SBOM management involves and how to implement best practices.

What Is an SBOM, and How Does It Impact Software Supply Chains? — February 14, 2023

A software bill of materials (SBOM) is the foundation for secure software supply chains. Explore what an SBOM is and how it involves and benefits companies.

How the Cybersecurity Framework and Risk Management Framework Inform a Risk Assessment — February 7, 2023

NIST, whether via its Risk Management Framework or its Cybersecurity Framework, continues to have a massive effect on the cybersecurity industry. Conduct your NIST framework-based risk assessment.

What Is Vulnerability in Cybersecurity? — January 30, 2023

Your cybersecurity is the safe for your very precious and potentially irreplaceable information. Identify vulnerability in cybersecurity to find out what you should address.

How To Implement Zero Trust at Your Business — January 24, 2023

Change your corporate mindset with a strategy that thinks outside of the perimeter. Find out how to implement zero trust at your organization.

Disaster Recovery for Active Directory: Planning Your Strategy — January 17, 2023

An Active Directory disaster recovery strategy reduces downtime and the financial toll of a disruptive incident. Learn how a proactive approach can improve business outcomes.

What Is a Risk Assessment for Cybersecurity — January 10, 2023

To prepare for the unknown, companies would benefit from performing a risk assessment for cybersecurity. With an assessment in place, companies can have a complete understanding of their digital assets and vulnerabilities, and how to address them.

What Is Information Security, and How Does It Affect Your Business? — December 20, 2022

What is information security? Explore the challenges of data protection and learn how an effective strategy can reduce your risks.

How To Build Cyber Resiliency in Your Business — December 19, 2022

Cyber resiliency for today’s businesses is as crucial as having a top-notch screening process for your top-level employees. Assess your preparedness today.

Incident Response Planning: Important Tips for Active Directory Users — December 13, 2022

Ensure Active Directory access with an effective incident response plan. Learn how to prepare and respond to a security event.

Build a custom security foundation

Click the button below and a team member will be in touch with you shortly.