<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

The Cyber Interview: Keys to reinforcing security by design

[fa icon="calendar'] Jan 18, 2018 6:38:43 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

During an earlier interview on the challenges relating to security by design and connected objects (IoT), Julien Patriarca, Professional Services Director at WALLIX and cybersecurity expert for more than a decade, tackled the issue of responsibility with regard to security.

Read More [fa icon="long-arrow-right"]

The Cyber Interview: Security by design and the IoT — who’s responsible?

[fa icon="calendar'] Jan 18, 2018 6:23:04 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

As digital technology and the Internet undergo constant change, users’ habits shift along with them, magnifying as a result their demands for speed and availability on the objects and tools that they use on a daily basis. But, the rush to digitalize everything to make life easier turns the spotlight on the challenges of cybersecurity in digital technology.

Read More [fa icon="long-arrow-right"]

Cybersecurity Trends and Cybersecurity Market Insights for 2018

[fa icon="calendar'] Jan 15, 2018 6:34:44 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Buckle up! If the expert forecasts are correct, 2018 is going to be quite a ride for cybersecurity professionals.

Read More [fa icon="long-arrow-right"]

Access Management Platform | WALLIX Access Manager

[fa icon="calendar'] Jan 9, 2018 9:42:47 AM / by WALLIX posted in Wallix Products

[fa icon="comment"] 0 Comments

Benefiting from an Access management platform is a key component of a comprehensive cybersecurity strategy.

Read More [fa icon="long-arrow-right"]

Reducing the Cost of a Data Breach with Privileged Access Management (PAM)

[fa icon="calendar'] Dec 26, 2017 3:12:11 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

If the 19th century poet Elizabeth Barrett Browning had been asked about cybersecurity, she might have written, “How does a data breach rack up costs? Let me count the ways.” 

Read More [fa icon="long-arrow-right"]