6 super-defenses against super-user attacks
Privileged Identity Management is based on a common link in the chain of almost every advanced threat: obtaining the credentials of an administrator, super-user or even a program with local admin rights. PIM tools lock down those special user credentials. Some PIM systems concentrate on auditing or anomaly detection so that even trusted insiders who have gone turncoat can be caught. Others look at the password aspect of identity management, cycling impossibly long randomized passwords. Some concentrate on Linux environments, while others are Windows-based. Almost all PIM tools embrace the concept of least-privilege, giving users only the level of access and privilege that they need to run a specific command. Read the full review.
To read this article in full or to leave a comment, please click here
Read more: 6 super-defenses against super-user attacks
More antivirus and malware news?
- Small and Medium Business Threat Awareness Report
- Researchers Say Code Reuse Links North Korea’s Malware
- Microsoft Office CVE-2017-0195 Privilege Escalation Vulnerability
- Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own
- NSA Surveillance Faces First Constitutional Challenge From Guy Arrested With Secret NSA Evidence
- 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
- Pennn State Altoona Voice Services Migration
- UCS will be partially unavailable
- The iMac Pro is now available—here’s how people are already using it
- WWDC 2024: Is Apple on the road to Siri 2.0?