A selection of work done for various clients over the years
11,000-word e-book for Thycotic
Project created from existing marketing materials and SME interviews.
From the Introduction: When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are
its endpoints. And not just any endpoints, but those running
Windows, Linux, macOS, or Unix operating systems. These
endpoints represent fertile ground for attacks because, more
often than not, their users, applications, and services have
elevated privileges that give cyber criminals an easy on-ramp
to the inner workings within your organization.
But you can fight back. Endpoint privilege management (EPM)
is a set of technologies IT security teams can use to automatically contain threats long before they become exploits. It all
comes down to applying the cyber security strategy of least
privilege. By limiting access to just the functionality each user,
application, and service needs to do its job, EPM and least
privilege ensure that if malware or a cyber criminal gain a
foothold, the threat is eviscerated and the damage contained.