How to Comply with NIS2 Directive MFA Requirements

In article 21, the NIS2 Directive defines the minimum set of security measures regulated entities must implement to comply with its requirements. Section 2(j) relates directly to Multi-Factor Authentication (MFA), stating that the security measures should include: ‘The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency […]

Solving the Toughest Challenges of Privileged Access Management

The standard way of addressing security issues that stem from an organization’s privileged user accounts is with a privileged access management (PAM) solution, which can be a very effective tool against threats that target admin credentials. However, when it comes to fully implementing PAM there are often significant challenges around onboarding, operating, and maintaining the […]

Complying with CCOP Identity Protection Requirements

The Cybersecurity Code of Practice for Critical Information Infrastructure 2.0 is an enhancement of the first version that was released in 2018. This cyber security standard is intended to specify the minimum cybersecurity requirements that organizations that operate Critical Information Infrastructure (CII) should implement. This applies to all components of an IT or OT system […]

How to Accelerate the Privileged Access Management Journey

A robust PAM solution in place deprives threat actors of the ability to utilize compromised admin credentials for malicious access and enables organizations to ensure that those who need privileged access get it in a secure manner. However, due to its lengthy and complex deployment time, PAM programs can often stretch over months and even […]