12Port blog
Notes from the privileged-access frontier.
Field reports, technical breakdowns, compliance updates, and product news from the 12Port team. Written for security architects, IT leaders, and the practitioners who run privileged access in production.
-
Cyber Insurance Now Requires Privileged Access Management
Cyber insurers are tightening requirements, raising premiums, and demanding proof that organizations can prevent credential misuse and contain lateral movement. In 2026, Privileged Access…
·
-
Agentless vs. Agent-Based Security: Why Agents Are Obsolete
Enterprise networks are constantly evolving, driven by innovations in technology and the increasing need for efficiency, scalability, and security. One key debate in this…
·
-
The Importance of Dynamic Asset Classification in Privileged Access Management (PAM)
In this post, we explore the importance of dynamic asset classification for Zero Trust security.
·
-
Why MSPs Should Add Privileged Access Management (PAM) To Their Security Offerings
It’s no surprise that the most popular managed service is security. Cybersecurity threats are a daily occurrence and continue to get more sophisticated, with…
·
-
Ring-fencing AI Workloads for NIST and ISO Compliance
As organizations race to deploy AI agents, they often overlook a critical risk: Identity Inheritance. AI workloads, model runners, and CI/CD bots often inherit…
·
-

How to Enable MFA Before RDP and SSH Sessions
Remote access is essential for modern enterprises. IT administrators, DevOps teams, and vendors need to connect to critical infrastructure using Remote Desktop Protocol (RDP)…
·
-
12Port Introduces Zero Trust Privileged Access Management (PAM) for Managed Service Providers
Enables MSPs to enhance their security offerings with a simple, scalable identity security solution. January 26, 2026 – [EXTON, PA] – 12Port, a pioneering…
·
-
Importance of a Zero Trust Architecture
Zero Trust Architecture (ZTA) is more than a buzzword; it is an essential security framework used to combat escalating cybersecurity threats. Cybersecurity has become…
·
-
Strengthening Healthcare Cybersecurity: The New HIPAA Updates and PAM
As the healthcare sector faces an unprecedented surge in cyberattacks, the U.S. Department of Health and Human Services (HHS) has proposed a long-overdue security…
·
-
The Cost of Inaction in Cybersecurity
When it comes to cybersecurity, doing nothing is not a strategy. It’s a liability. Organizations must make an effort to improve their security posture…
·