<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

The Year of the RAT: Don’t let your IT turn into a RAT’s nest

[fa icon="calendar'] Mar 31, 2020 11:41:10 AM / by Eric Gaudin

[fa icon="comment"] 0 Comments

The first blog of this series established that well-planned cybersecurity is necessary to achieve sustainable protection against the mutating threats that are Remote Access Trojans (RATs). We also identified how local protections through endpoint solutions can effectively contain malware.

Read More [fa icon="long-arrow-right"]

Endpoint Privilege Management: A New Generation of 007

[fa icon="calendar'] Mar 26, 2020 6:46:36 PM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Contrary to popular belief, cyberattacks are not (always) a massive attempt to take over or disable your infrastructure. While a wide DDOS attack can be used as a decoy, the real work is more subtle, more elaborate. Consider a James Bond film, for example. The bad guy would try to infiltrate your organization quietly, identify its weaknesses, and attempt to gain power gradually in order to fulfill his villainous plan.

Just as in those Bond movies, broad, external defenses are not enough, and usually countermeasures come too late to stop the infiltration. This is especially true for fragmented organizations and enterprises relying heavily on external contractors and employees working remotely. Once an enemy has found his way in, the whole organization falls. With 69% of breaches perpetrated by outsiders like organized criminal groups and nation-states, it takes a special problem-solver like 007 to save the day.

Read More [fa icon="long-arrow-right"]

Year of the RAT: Keep your business out of the reach of RATs

[fa icon="calendar'] Mar 4, 2020 11:12:15 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

2020 is the Year of the Rat, so we're kicking the year off with everything you need to know about the nefarious RATs... Remote Access Trojans. In the first post, we described a RAT's capabilities and the necessary steps to take in order to protect your infrastructure against this type of cyberattack. In this second installment, we're taking a look at just how much of a threat a RAT is to your system.

Read More [fa icon="long-arrow-right"]

The Year of the RAT: Successful Cybersecurity By Knowing Your Threat

[fa icon="calendar'] Jan 24, 2020 5:33:58 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

Chinese New Year 2020: The Year of the RAT

The year of the rat is going to be a strong, prosperous and lucky year, for those that carefully plan their objectives.

Read More [fa icon="long-arrow-right"]

Bastion Session Sharing: Empowering Secure Remote Collaboration

[fa icon="calendar'] Dec 12, 2019 4:27:00 PM / by Eric Gaudin

[fa icon="comment"] 0 Comments

Collaboration is essential in order to handle the diversity and complexity of the IT infrastructure required by today's digital transformation. This is particularly true when your workforce goes remote, and external contractors require access to critical infrastructure to provide maintenance to systems and equipment, and assist with critical systems setup.

Read More [fa icon="long-arrow-right"]