<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

3 Questions CISOs Should Really Be Asking

[fa icon="calendar'] Apr 10, 2019 11:45:14 AM / by WALLIX posted in Preventing Insider Threat, Reaching IT Compliance, Improving Cybersecurity

[fa icon="comment"] 0 Comments

The key objective of any CISO (Chief Information Security Officer) is the prevention of impact to the organization from any form of security breach. This, as we know, is much easier said than done. A good CISO, in fact, comes to work every morning assuming that a breach has already happened, with a view to fixing any vulnerabilities and securing the system to the highest standard possible. Every single day.

Read More [fa icon="long-arrow-right"]

Privacy and Security By Design: What IoT Manufacturers Need To Know

[fa icon="calendar'] Jan 30, 2019 7:13:00 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

 

Read More [fa icon="long-arrow-right"]

What is the Principle of Least Privilege and How Do You Implement It?

[fa icon="calendar'] Jan 22, 2019 12:27:05 PM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity

[fa icon="comment"] 2 Comments

In the military, they have a well-known phrase that happens to succinctly describe the definition of the least privilege principle: ‘Need-To-Know Basis’. For the military, this means that sensitive information is only given to those who need that information to perform their duty. In cybersecurity, it’s much the same idea. The ‘least privilege’ principle involves the restriction of individual user access rights within a company to only those which are necessary in order for them to do their job. By the same token, each system process, device, and application should be granted the least authority necessary, to avoid compromising privileged information.

Read More [fa icon="long-arrow-right"]

2018 Breaches: How PAM Could Have Helped Prevent the Worst of Them

[fa icon="calendar'] Dec 27, 2018 3:30:21 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

There have been quite a few security breaches to hit the news in 2018. As each story broke, it seemed like it couldn't get worse, only to find that the next data breach was just around the corner, and even more severe, exposing the data of millions of customers worldwide. We have had a few of those this year.

Read More [fa icon="long-arrow-right"]

WALLIX is positioned in Gartner’s first Magic Quadrant for PAM

[fa icon="calendar'] Dec 18, 2018 6:29:36 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 3 Comments

WALLIX is positioned in Gartner’s first Magic Quadrant for Privileged Access Management (PAM)

Read More [fa icon="long-arrow-right"]