Privileged access management
Get tips and advice on privileged access management and user provisioning, such as how to administer employee access, managing IDs and passwords, and restricting privileged accounts. Learn about the risks of privilege escalation vulnerabilities and unrestrictred access accounts.
New & Notable



Your Guide to Info Sec Certifications
We’ve collected 30+ certifications for you. Which vendor-neutral and vendor-specific security certifications are best for you? Save time by downloading our list organized by experience level.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Privileged access management News
-
April 17, 2018
17
Apr'18
Compromised cloud credentials still plaguing enterprises
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
-
June 23, 2017
23
Jun'17
Privileged user management trips up NSA
News roundup: DOD inspector general found NSA failed to implement secure privileged user management post-Snowden. Plus, Honda hit by WannaCry, Trump met with tech CEOs and more.
-
January 13, 2016
13
Jan'16
RSA president outlines cloud security strategy, IDaaS plans
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.
-
August 07, 2015
07
Aug'15
Black Hat 2015: Machine learning security must add variety
Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.
Privileged access management Get Started
Bring yourself up to speed with our introductory content
-
federated identity management (FIM)
Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group. Continue Reading
-
CISSP Domain 5: Cloud identity management and access control
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
-
principle of least privilege (POLP)
The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work. Continue Reading
Evaluate Privileged access management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Determine the right level of data center access for administrators
If you hand out administrative access too freely, you risk leaving your data center vulnerable to rogue IT administrators and cyberattacks. Continue Reading
-
How do identity governance and access management systems differ?
Identity governance and access management systems overlap naturally, but they are still distinct. Expert Matthew Pascucci explains the difference between these two aspects of IAM. Continue Reading
-
IAM strategy: Update to work with new technologies
Your organization needs to make decisions about its IAM strategy in order to keep up with the new technologies its deploying. Steps to take begin at the policy level. Continue Reading
Manage Privileged access management
Learn to apply best practices and optimize your operations.
-
Why locking down privileged accounts is a security essential
Access to the accounts of privileged users top most hackers' wish lists. Expert Michael Cobb reviews how hackers target these accounts and outlines ways to keep them locked tight. Continue Reading
-
identity and access management (IAM)
Identity and access management (IAM) is a framework for business processes that facilitates the management of electronic or digital identities. Continue Reading
-
Managing access to keep privileged users' credentials secure
Privilege creep is a constant threat. It's why privileged user management must be part of any comprehensive security plan and always at the top of an infosec pro's to-do list. Continue Reading
Problem Solve Privileged access management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Targeted attack awareness gives firms edge against hackers
Cybercriminals use targeted attacks to endanger the future of your organization. Learn what defensive moves you can put in place now to avoid more severe attacks later on. Continue Reading
-
How did a Moodle security vulnerability enable remote code execution?
A series of logic flaws in Moodle enabled attackers to remotely execute code on servers. Expert Michael Cobb explains how the Moodle security vulnerability can be exploited. Continue Reading
-
How did thousands of MongoDB databases get hijacked?
Thousands of MongoDB configurations were hijacked due to poor authentication practices. Expert Nick Lewis explains how organizations can properly configure their implementations. Continue Reading