<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

Will you survive your next security audit?

[fa icon="calendar'] Apr 3, 2018 2:04:03 PM / by Eric Gaudin posted in Preventing Insider Threat, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

A security audit is something that every single company with an internet connection, and that handles customer/individual data should be concerned with. Without elaborating more than necessary, recent regulations makes it, if not mandatory, at least strongly recommended to audit your IT security to ensure compliance.

Read More [fa icon="long-arrow-right"]

WAB is dead, long live the Bastion 6.0

[fa icon="calendar'] Feb 8, 2018 2:27:54 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 2 Comments

New year, new version for the long-awaited version: the Bastion 6.0.

Read More [fa icon="long-arrow-right"]

Discover Privileged Accounts with WALLIX Discovery

[fa icon="calendar'] Feb 1, 2018 10:05:00 AM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

Do you really know who is wandering on your network?

Read More [fa icon="long-arrow-right"]

Understanding the Uber hack with Privileged Access Management (PAM)

[fa icon="calendar'] Nov 29, 2017 4:08:56 PM / by Eric Gaudin posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

  • The data of 57 million users has been stolen from Uber.
  • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data.
Read More [fa icon="long-arrow-right"]

SSH agent-forwarding: going barefoot (socket-less)

[fa icon="calendar'] Nov 24, 2017 11:28:50 AM / by Eric Gaudin posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Would you really wear sockets with flip flops to walk on a nice sandy beach? The same thing goes with SSH agent-forwarding: using a socket can sometimes be inappropriate.

Read More [fa icon="long-arrow-right"]