Bert Blevins
Bert Blevins press releases
-
Houston, Texas – February 17, 2025 – Let’s face it—passwords alone are about as secure as a “Keep Out” sign on your yard fence. That’s why Multi-Factor Authentication (MFA) steps in as the caped crusader of cybersecurity, teaming up with Privileged Access Management (PAM) on the Delinea platform. Together, they create a formidable defense against cyber threats, ensuring that access to privileged accounts remains secure, controlled, and breach-resistant. With...
-
Houston, Texas – February 17, 2025 – Privileged Access Management (PAM) isn't just about keeping the bad guys out—it’s about keeping a close eye on what the good guys are up to as well. Enter PAM-tastic Investigations: The Art of Catching Privileged Shenanigans, where Bert Blevins of BertBlevins.com sheds light on the critical role of PAM auditing and reporting in modern cybersecurity. Ever wonder what your privileged users are really up to when they think no one's watching? Are...
-
Houston, Texas – February 17, 2025 – Unmanaged privileged accounts pose a significant security threat, granting unrestricted access to critical systems and sensitive data. Without proper oversight, these accounts become prime targets for cybercriminals and insider threats, leading to devastating consequences. 1. Credential Theft & Lateral Movement – Attackers exploit privileged credentials to navigate networks undetected. 2. Insider Threats & Abuse – Employees or...
-
Houston, Texas – February 17, 2025 – In today's rapidly evolving digital landscape, privileged accounts have become both a critical asset and a formidable risk in the realm of cybersecurity. These accounts—whether administrative, service, or root—are designed to grant extensive access and control over vital systems. However, their elevated privileges also make them prime targets for cyber attackers. Bert Blevins, cybersecurity expert and founder of BertBlevins.com, is shedding...
-
Houston, Texas – October 2025 – It’s October, the spookiest time of the year—when ghouls and goblins roam the streets, and… cybercriminals haunt your inbox? That’s right, folks! While you’re busy carving pumpkins and picking out the perfect Halloween costume, hackers are plotting tricks far scarier than any haunted house. Welcome to Cybersecurity Awareness Month, where instead of ghosts in the closet, we’re talking about malware in your system. And just...
-
Houston, Texas – February 17, 2025 – Cybersecurity threats continue evolving at an alarming pace, leaving businesses to grapple with a critical question: Is cyber insurance worth the investment? As ransomware attacks surge and data breaches make headlines, organizations must weigh the costs of coverage against potential catastrophic losses. In 2023 alone, the average cost of a data breach reached $4.45 million, according to IBM's Cost of a Data Breach Report. This staggering figure...
-
Houston, Texas – February 17, 2025 – If you’re a cybersecurity admin, chances are you’re juggling a never-ending stream of alerts, compliance audits, user requests, and surprise incidents—often before your first coffee kicks in. Between keeping the bad guys out, managing an ever-expanding list of security tools, and trying to maintain some semblance of work-life balance, it’s easy to feel like you’re drowning in a sea of chaos. Recognizing the daily struggles...
-
Houston, Texas – February 16, 2025 –Delinea’s security solutions are powerful, but navigating them can feel like solving a cybersecurity escape room. From Secret Server to Privilege Manager, Privilege Control for Servers, and the Delinea Platform, each tool is essential for Privileged Access Management (PAM)—but where should organizations begin? In his latest LinkedIn article, cybersecurity expert Bert Blevins, founder of BertBlevins.com, presents The Unofficial Guide to...
-
Houston, Texas – February 16, 2025 –Servers are powerful, moody, and prone to risky behavior—just like teenagers. If left unsupervised, they can become a cybersecurity liability, making bad decisions and allowing unauthorized access. That’s why Privileged Access Management (PAM) for servers is essential—it acts as the ultimate babysitter, enforcing security rules, limiting access, and preventing unauthorized intrusions. In his latest LinkedIn article, cybersecurity expert...
-
Houston, Texas – February 16, 2025 –As cyber threats evolve faster than ever, traditional security measures are struggling to keep pace. Artificial Intelligence (AI) is stepping in as the next frontier of defense, offering real-time anomaly detection, predictive threat prevention, and automated response capabilities. But with this transformation comes new challenges, risks, and ethical considerations. In his latest LinkedIn article, cybersecurity expert Bert Blevins, founder of BertBlevins...
-
Houston, Texas – February 16, 2025 – As organizations accelerate cloud adoption, remote work, and automation, the need for robust Privileged Access Management (PAM) solutions has never been greater. In his latest LinkedIn article, cybersecurity expert Bert Blevins, founder of BertBlevins.com, explores the key aspects of PAM and emerging trends shaping the future of privileged access security. Read the full article here. “Privileged Access Management is more than just a security...
-
Houston, Texas – February 16, 2025 – What seems like a quick fix for IT teams—sharing admin accounts—could be a catastrophic security risk for organizations. In his latest LinkedIn article, cybersecurity expert Bert Blevins, founder of BertBlevins.com, exposes the hidden dangers of shared credentials and why they must be eliminated to safeguard businesses. Read the full article here: The Hidden Dangers of Sharing Admin Accounts “Sharing admin accounts is like handing out...
-
Houston, Texas – February 16, 2025 – Privileged Access Management (PAM) is a critical component of cybersecurity, but mastering it doesn’t have to be complicated. Bert Blevins, cybersecurity expert and founder of BertBlevins.com, is serving up an innovative approach with the Unofficial Delinea Solutions Cookbook – Essential Recipes for PAM. In his latest LinkedIn article, Blevins presents a fresh, engaging way to tackle PAM challenges: Read the full post here. “Just like...
-
Houston, Texas – February 16, 2025 – In today’s rapidly evolving cybersecurity landscape, organizations must prioritize Privileged Access Management (PAM) as a strategic pillar for protecting critical assets, enforcing least privilege, and ensuring compliance. But how can security teams effectively measure the success of their PAM solution? Bert Blevins, cybersecurity expert and founder of BertBlevins.com, explores this critical question in his latest article: “Unlocking...
-
Houston, Texas — February 15, 2025 — If IT security were a reality show, session monitoring would be the camera crew, capturing every keystroke, mouse click, and “accidental” detour to YouTube. But not all monitoring systems are created equal—some deserve an award, while others barely make it past the first episode. BertBlevins.com takes a deep dive into this battle for the "Best Performance in a Starring Role" in a new LinkedIn post by cybersecurity expert Bert Blevins...
-
Houston, Texas — February 15, 2025 — Remote access: a gateway to seamless productivity or an open invitation for IT chaos? Whether you’re dialing in from the comfort of your couch or “working” during your cousin’s never-ending wedding toast, choosing the right remote access tool can make all the difference. BertBlevins.com breaks it all down in a new LinkedIn post by cybersecurity expert Bert Blevins: Read the full post here. In the spotlight: Delinea’s RDP...
-
Houston, Texas — February 15, 2025 — Remote access: a gateway to seamless productivity or an open invitation for IT chaos? Whether you’re dialing in from the comfort of your couch or “working” during your cousin’s never-ending wedding toast, choosing the right remote access tool can make all the difference. BertBlevins.com breaks it all down in a new LinkedIn post by cybersecurity expert Bert Blevins: Read the full post here. In the spotlight: Delinea’s RDP...
-
Houston, Texas — February 15, 2025 — Passwords: the broccoli of the digital world. We know they’re necessary, but we’d rather skip them in favor of something easier—like biometrics or autofill. That’s why many rely on password managers to keep things in check. But is a basic password manager really enough for enterprise security? BertBlevins.com explores this crucial cybersecurity debate in a new LinkedIn post by Bert Blevins: Read the full post here...
-
Houston, Texas — February 15, 2025 — Passwords: the broccoli of the digital world. We know they’re necessary, but we’d rather skip them in favor of something easier—like biometrics or autofill. That’s why many rely on password managers to keep things in check. But is a basic password manager really enough for enterprise security? BertBlevins.com explores this crucial cybersecurity debate in a new LinkedIn post by Bert Blevins: Read the full post here...
-
Houston, Texas — February 15, 2025 — Passwords: the broccoli of the digital world. We know they’re necessary, but we’d rather skip them in favor of something easier—like biometrics or autofill. That’s why many rely on password managers to keep things in check. But is a basic password manager really enough for enterprise security? BertBlevins.com explores this crucial cybersecurity debate in a new LinkedIn post by Bert Blevins: Read the full post here...

