Monnia Deng

Find me on:

Recent Posts

Ping + Preempt: Securing All Access In Hybrid Cloud Environments

Posted by Monnia Deng on Jun 25, 2019 10:21:11 AM

Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop risky activity. Add in the complexity of a hybrid cloud environment, multiple legacy systems, unmanaged endpoints, and unsanctioned applications, and it's no wonder organizations struggle to get the insight needed to make real-time decisions and stop risky and potentially malicious activity. 

Preempt has always prioritized the need for contextual insight about threats and risk, using that information to enforce conditional MFA to every access attempt so that organizations can get a better grasp on security. In doing so, Preempt has partnered with Ping to give security teams the ability to extend conditional MFA to any network resource as well as any Ping-federated application on-premises or in the cloud.

Read More

Topics: Multi-factor Authentication, Cloud, Conditional Access, Ping

Zero Trust is a Pipe Dream...

Posted by Monnia Deng on Apr 5, 2019 1:01:35 PM

….if you don't even know your users and what they are accessing. (Ha - I got you there with the clickbait title)

Read More

M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

Posted by Monnia Deng on Mar 26, 2019 12:35:54 PM

Enterprises are often forced to implement multiple moving parts as the traditional network perimeter is no longer sufficient to protect against modern threats. These disjointed security solutions rarely talk to each other, causing security silos and an overwhelming number of distracting security alerts, Preempt CEO Ajit Sancheti explains in a podcast this week.

Read More

Topics: CISO, Risk

Can You Stop a Breach in 19 Minutes?

Posted by Monnia Deng on Feb 27, 2019 10:03:31 AM

Spotting an initial breach of a network is already difficult. New research begs an additional question: can you stop attackers from gaining control of your critical systems and applications in a matter of minutes? According to Crowdstrike, if you can't detect and respond to a breach in under 19 minutes, you may be vulnerable to Russian hackers. In their annual threat report, Crowdstrike found that Russian hackers had a “breakout time” - the time a hacker takes from gaining initial foothold in the network to when they start moving laterally to critical machines - of just 18 minutes and 49 seconds, which is the fastest in the world. North Korea, China, and Iran placed second, third, and fourth, respectively (English-speaking countries were not studied, but we imagine the US and UK would be among the top of the list).

Read More

Topics: Hacking

Optimize Your Okta Deployment with Preempt

Posted by Monnia Deng on Feb 21, 2019 12:16:50 PM

Enabling customers to secure their corporate assets while easily moving to the cloud has always been at the forefront of Preempt’s mission. While Preempt shines in preventing network threats with our unique detection capabilities, such as our ability to detect NTLM relay attacks in real-time, our goal has always been to bring these advanced threat detection and prevention capabilities to the cloud.

Read More

Topics: Use Case, Integration

Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

Posted by Monnia Deng on Jan 25, 2019 10:25:25 AM

UPDATE (Jan. 25): Recent news reports state a deal has been reached to re-open the federal government through Feb 15. The issues outlined in this blog continue to apply to public and private sector organizations.

As many of you may have read in the news recently, the government shutdown has had a negative impact on both federal and enterprise security. Krebs on Security has reported possible consequences of the government shutdown on the talent pool, such as federal employees actively being recruited by the private sector, as well as delays on security clearances. Duo Security’s news arm, Decipher, has also done a great job laying out potential government shutdown impacts on enterprise security, including delays on NIST guidelines and standards, and closure of FIPS validation sites.

Read More

Topics: Risk, Credential Compromise, Hacking

Making Privileged Access Management Complete: Find the JIM to your PAM

Posted by Monnia Deng on Jan 10, 2019 1:50:15 PM

You read that right. In a shameless reference to the Office, I want to be the JIM to your PAM. Jim and Pam’s relationship was undeniable from the start: both of them had a mutual understanding and fit. While they constantly denied their relationship, it was evident that being together made them stronger and better.

Read More

Topics: Privileged Users, Privileged Accounts

Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Posted by Monnia Deng on Dec 24, 2018 9:21:00 AM

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la! 

'Tis the season to be swindled, Fa, la, la, la, la, la, la, la, la!

Read More

Topics: Threat Mitigation, User Behavior

5 Key Takeaways from the Gartner IAM Summit

Posted by Monnia Deng on Dec 7, 2018 10:44:33 AM

This week, IAM and security professionals came together in Las Vegas for the Gartner Identity and Access Management (IAM) Summit to discuss the top trends and strategies across the IAM landscape in 2018 and beyond. From best practices for implementing mature solutions to discussions about the future of the innovative technologies, the summit gave refuge for all the weary-eyed professionals looking to tackle their biggest security challenges.

Read More

Topics: Identity