<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
strongDM logo

blog

What Is RBI? Remote Browser Isolation Explained

What Is RBI? Remote Browser Isolation Explained

In this article, we take a deep dive into Remote Browser Isolation (RBI), its history, and how it works. You'll learn about the common challenges
What Is UEBA? User and Entity Behavior Analytics Explained

What Is UEBA? User and Entity Behavior Analytics Explained

In this article, we will explain how User and Entity Behavior Analytics (UEBA) helps modern organizations defend against sophisticated,
Five Spine-Chilling Credential Theft Stories
Five Spine-Chilling Credential Theft Stories
Gather ‘round for five, real-life stories of data breach that will haunt your dreams. You’ll find no ghosts, ghouls, or vampires here—though there may be zombies. Read on if you dare…
Are Your Databases a Pain in the Access?
Are Your Databases a Pain in the Access?
The number and complexity of databases that every organization must manage has skyrocketed. If you need access - or need to provide it - it can sure be a pain in the access to manage.
40+ Alarming Cloud Security Statistics in 2022
40+ Alarming Cloud Security Statistics in 2022
This article will cover statistics highlighting the extent of these cloud security breaches, who is most affected, how much money this is costing everyone, what the conduits of the security breaches are, and what people intend to do about it.
What Is Data Exfiltration? (And the Best Way to Prevent It)
What Is Data Exfiltration? (And the Best Way to Prevent It)
In this article, we’ll explore what data exfiltration is, the difference between exfiltration of data and data leakage, and how to detect data exfiltration. You’ll learn the dangers of data exfiltration in cybersecurity, data exfiltration examples, and the types of exfiltrated data that malicious actors target most. By the end of this article, you’ll know what causes data exfiltration, common data exfiltration tactics, and how to prevent data exfiltration in your organization.
How to Maintain ISO 27001 Certification in 2022 and Beyond
How to Maintain ISO 27001 Certification in 2022 and Beyond
This article examines what happens after companies achieve IT security ISO 27001 certification. We’ll answer questions about how to maintain ISO certification, how long ISO 27001 certification is valid, and the costs and risks of failing to maintain compliance. By the end of this article, you’ll know the certifying body requirements and what your checklist should look like for staying on top of your ISO 27001 certification.
What Is Anomaly Detection? Methods, Examples, and More
What Is Anomaly Detection? Methods, Examples, and More
This article covers everything you need to know about anomaly detection and why anomaly detection is important for your organization’s security. You’ll learn about common challenges companies face when detecting anomalous data, types of anomaly detection, and anomaly detection methods your company can leverage. By the end of this article, you’ll know how to find anomalies in data and prevent irregular data incidents with practical anomaly detection models.
What is Sensitive Data? Definition, Examples, and More
What is Sensitive Data? Definition, Examples, and More
In this article, we cover the sensitive data definition and the main risks associated with it. You'll see real sensitive information examples and learn how sensitive data differs from personal data. By the end of this article, you'll understand what data is sensitive and how to protect it against cyber risks and exposures.
How Better Access Improves Productivity of Tech Staff [New Research]
How Better Access Improves Productivity of Tech Staff [New Research]
Have you ever wondered how access impacts your productivity? If you're like most technical staff, the sum of hours lost adds up quickly across teams. It makes sense though. The longer it takes for you to access the systems you need, the less productive you are on any given day. And what happens when that access is too difficult to get? We found that teams typically set up workarounds.
CyberArk vs. BeyondTrust: Which PAM Solution is Better?
CyberArk vs. BeyondTrust: Which PAM Solution is Better?
This article compares two Privileged Access Management (PAM) solutions, CyberArk vs. BeyondTrust. It takes a closer look at what these two PAM products are, how they work, and what may make them fit well with your organization. We’ll explore product summaries, use cases, pros and cons, PAM features, and pricing. By the time you’re done reading this article, you’ll have a clear understanding of how these PAM tools operate and be able to choose the one that will work best for you.
What is Identity as a Service (IDaaS)? All You Need to Know
What is Identity as a Service (IDaaS)? All You Need to Know
In this article, we’ll examine what Identity as a Service (IDaaS) is and how companies use IDaaS to enhance their security posture. You’ll learn why identity and access management (IAM) is important, how outsourcing IAM can support your goals, and the limitations of using a cloud-based IDaaS. By the end of this article, you’ll understand how an IDaaS solution works, the problems IDaaS addresses, and the role IDaaS will play in the future of identity management.
What Is a Honeypot? How Trapping Bad Actors Helps Security
What Is a Honeypot? How Trapping Bad Actors Helps Security
In this article, you’ll what a honeypot is what honeypots are used for, and the benefits and risks associated with them. You’ll also learn about the different types and examples of honeypots and how they work. By the end of the article, you’ll have a deeper understanding of honeypots in cyber security, and how a secure infrastructure access platform can help you safeguard your network, systems, and apps without using a honeypot.
What is Cyber Insurance? Definition, Coverage, Cost & More
What is Cyber Insurance? Definition, Coverage, Cost & More
As cyber threats have increased in recent years, more organizations are turning to cyber insurance to mitigate their financial risks. In this article, we’ll review cyber insurance basics, including what cybersecurity insurance is, how it works, what it covers, and what it costs. By the end, you will understand the different types of cyber insurance, the benefits of coverage, and how cyber insurance fits into a comprehensive security strategy.
StrongDM app UI showing available infrastructure resources
Connect your first server or database in 5 minutes. No kidding.