
ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology

ICS and OT Systems are Becoming More Frequent Cyber Attack Targets
The term “cyber attack” brings ransomware and stolen data to mind, but today there’s a quieter yet equally devastating war being waged against industrial control systems (ICS) and operational technology
Previous

Zero Trust and Privileged Access Management: NIST 800-207
Zero trust has been a long-known concept within the cybersecurity industry but has not, until recently, trickled out into the

The Existing Authentication Paradigm is Failing Us
The headlines make clear what many in the industry have long known to be true – cyberattacks are on the

Biden’s Executive Order on Cybersecurity Is a Needed Response to Growing Cyber Threats
Over the last year, we’ve seen a series of dramatic cyber-attacks on U.S. soil. Just three of these paint a

Plurilock™ Enables Critical Systems to Both Restrict and Guarantee Access at the Same Time, Seamlessly
Critical systems are a tricky problem in most organizations. They're not just critical because bad things will happen if they

How Identity-as-a-Signal is the Secret to Protecting Against Credential Compromise
When malicious actors get administrator access in an Active Directory (AD) environment, illicit activity can be extraordinarily difficult to detect

When Stolen Credentials are $7,100 a Set, You Need Behavioral Biometrics
The Register recently reported that initial access brokers are doing a brisk business following the work-from-home push of 2020. Among

With Behavioral Biometrics, IAM Meets DFIR
Modern DFIR practices and processes bring a whole slew of systems, data sources, and types of expertise to bear in

Identity in Cybersecurity Ep. 9 — Reducing the Noise
How do you prevent juggling thirty disparate security tools? Do you find it hard to correlate relationships between massive amounts

Identity in Cybersecurity Ep. 8 — The Visibility Issue
How do you source cybersecurity talent? Which skills or certifications actually make the best hires? In this episode, Plurilock™ CEO

Introducing Our Q4’20 Release—With Scalability, Proxy, and Support Enhancements
Over the second half of 2020, we've been privileged to have received a good deal of valuable feedback from our

Eight Security Capabilities Enabled by a Continuous Identity Signal
As a continuous identity solution, Plurilock DEFEND™ is able to provide a real-time signal that confirms the identity of the

As SSO Becomes Standard, A New Best Practice is Needed
Single sign-on (SSO) and identity-as-a-service (IDaaS) platforms are rapidly becoming standard tools across the business world—and with good reason. As

Identity in Cybersecurity Ep. 7 — Pushing Security to the Edges
How should organizations be thinking about identity and access management today? In this episode, Plurilock™ CEO Ian L.Paterson talks with

Identity-as-a-signal Will Rewrite the Rules in Identity and Access Management
CISOs today are scrambling to cope with a multiplying universe of systems and access management scenarios. The typical enterprise hosts

Identity in Cybersecurity Ep. 6 — Through a Holistic Lens
How do you adequately authenticate a person, device, or organization? In this episode, Plurilock™ CEO Ian L.Paterson talks with Joni

Unlike Behavioral or Biometric Authentication, Behavioral Biometrics Is Privacy-friendly
In recent years, both biometric authentication and behavioral authentication have increased in popularity as advances in technology have made them

Identity in Cybersecurity Ep. 5 — Getting Your Arms Around the Root of the Problem
What happens when organizations don’t have identity management practices and systems in place, and what can be done to solve

It’s 2020 and Passwords Should No Longer Be a Problem
Fifteen years ago, password policies started to look something like this: At least ten characters. At least one capital letter,


Safeguard your company data.
Stop unauthorized downloading, uploading, copy-pasting, emailing, and sharing.