<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Grant Burst


Recent Posts

The Wallix Approach to Advanced Persistent Threat (APT)

[fa icon="calendar'] May 19, 2016 6:00:00 AM / by Grant Burst posted in Preventing Insider Threat, Mitigating External Attacks, WALLIX Products

[fa icon="comment"] 0 Comments

Many organisations are upgrading their firewalls to stop APTs but this only offers protection from external attacks and internal traffic routed through the trusted zones.

 

 

Read More [fa icon="long-arrow-right"]

Are you really reading all those log reports?

[fa icon="calendar'] Sep 8, 2015 3:00:00 PM / by Grant Burst posted in WALLIX Products, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Compliance says that we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?

Read More [fa icon="long-arrow-right"]

IT Security: The Insider and Ex-Employee threat

[fa icon="calendar'] Oct 30, 2014 12:45:06 PM / by Grant Burst posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments


A recent survey by Homeland Security Today found that 88% of companies that were questioned recognise insider threats as a cause for alarm but have difficulty identifying specific threatening actions by insiders

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security