Security

Scary-List-Worst-Passwords-Devolutions

The Scary List of the Worst Passwords

We have some good news, and some bad news. Let's start with the good news. The good news is that Star Wars Episode 9 will be released later on this year, and it looks like Emperor Palpatine will be ba...

Protection-Against-7-Notorious-Online-Scams

IT Pros: Protect Your End Users from These 7 Notorious Online Scams

As an IT pro, you’re probably very capable of steering clear of online scams. However, your non-technical end users may not be so fortunate. And if they get hacked on their personal device, there is a...

Ins-Outs-File-Centric-Security-Devolutions

The Ins And Outs Of File-Centric Security

In today’s enterprise, securing your organization’s perimeter isn’t enough. You need to think beyond your business’s walls by considering how remote workers, partners, and suppliers are accessing your...

2019-7-Cybersecurity-Trends-Devolutions

7 Cybersecurity Trends We're Likely to See in 2019

Check the calendar, open the nearest window: spring is in the air. That means, alongside your traditional spring clean, it’s time once again to clear out your cyber clutter. Don’t miss this fresh oppo...

How Prevent Cybersecurity Disaster 2019

How to Prevent Cybersecurity Disaster in 2019 (What 2018 Taught Us)

Cyberattacks continue to increase in both frequency and sophistication. Nefarious parts of the web contain guides that teach people how to perform phishing attacks and ransomware attacks. Furthermore,...

The Basics of GDPR

Last year around this time, you may recall getting a flurry of emails from various vendors like Google, Apple, and even your friends here at Devolutions, informing you about their obligations and your...

AI Data Protection Private Security

Can AI Be the Answer to Data Protection and Private Security ?

AI – The Potential Answer to Enterprise, Government, and Personal Security The beauty of AI lies in its ability to learn from previous data. And it uses that previous data to make recommendations and ...

NIST Advise Against Regularly Changing Passwords

NIST Changes Course and Advises Against Regularly Changing Passwords

The U.S. National Institute of Standards and Technology (NIST) has updated its recommendations for user password management, and some of the advice is causing quite a stir across the InfoSec world. O...

SOC 2 Certification – We’re Almost There!

Recently, we highlighted that we have added 2FA to Devolutions Cloud, and we plan on expanding 2FA across all of our products in the coming months. Today, we take a deeper look at another major securi...

Best Practices Zero Trust

The Basics of Zero Trust Architecture + 8 Best Practices

The conventional approach to information security is to deploy enforcement mechanisms at the network perimeter, such as next-generation firewalls, proxy servers, network intrusion detection systems, a...

Devolutions Under the Hood - SSO for Devolutions Account

As part of our ongoing focus on helping Sysadmins and other IT professionals enhance security and strengthen governance, I am delighted to announce that we have integrated Single Sign-On (SSO) for Dev...

Cyber Security Quick Wins

5 Cybersecurity Quick Wins

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ...

Principle Least Privilege POLP Explained

Principle of Least Privilege (POLP): What, Why & Best Practices

The principle of least privilege (POLP) is a policy in which end users are given only the amount of access they need to carry out their jobs — nothing more and nothing less. Understandably, some end u...

Password Manager vs. Privileged Access Management (PAM) vs. Single Sign-On (SSO)

It’s been said that in life, it’s the simple things that really matter — like watching a lovely sunset or playing with your cat. But sometimes life gets complicated, like when you’re trying to figure ...

The Critical Importance of Privileged Identity Management (PIM)

As security and risk management (SRM) professionals know — and sometimes have a difficult time getting end users, customers, and other stakeholders to understand and accept — the most important piece ...

Simple Hack Can Destroy Customer Trust

Why a Simple Hack Can Destroy Customer Trust

In recent years, trust in general online security has taken a significant hit. Many high-visibility hacks and data leaks have led people (quite sensibly) to fear for the safety of their information. A...

Giving Everyone Administrative Rights Bad Idea

4 Reasons Why Giving Everyone Administrative Rights is a Bad Idea

In the offline world, we don’t let just anyone wander around our offices looking into files and opening drawers and cabinets. We have role-based security to keep things safe and secure. However, in th...

Sphinx DePake Security Explained Devolutions

What are SPHINX and DE-PAKE?

Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “tha...

7 Critical Features PAM Solution

7 Critical Features to Look for in a Privileged Access Management Solution

Several years ago, to defend against hackers, it was fine for organizations to rely on anti-virus software, secure web gateways, firewalls, and other perimeter-based security tools. But these days, it...

Educate Users About Good Password Policies

5 Tips to Educate Users About Good Password Policies

Data breaches are happening all the time, in both big enterprises and even more so in SMBs – which experts view as “ground zero” for cyber crime. As a result, developing good password policies is esse...