<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Mind the Gap: Using PAM for Network Segmentation

[fa icon="calendar'] Nov 14, 2019 11:37:31 AM / by WALLIX posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

Network segmentation and segregation have been around for a long while – as long, in fact, as there have been private networks connected to the internet. And while network segmentation is vital  and will be familiar to many through its implementation via firewalls and DMZs, network segregation also has a vitally important role to play in cybersecurity. 

Read More [fa icon="long-arrow-right"]

Securing IIoT with Privileged Access Management

[fa icon="calendar'] Nov 5, 2019 11:53:23 AM / by WALLIX

[fa icon="comment"] 0 Comments

The recent growth of the Internet of Things (IoT) and its industrial-driven subset, the aptly-named Industrial IoT (IIoT), has been staggering. Growth projections, too, are staggering as better IT-OT connectivity, sensors, and control devices continue to generate more and more use cases for implementations across manufacturing, transportation, and many more industries.

Read More [fa icon="long-arrow-right"]

Least Privilege At Work: PEDM and Defense in Depth

[fa icon="calendar'] Oct 16, 2019 11:13:40 AM / by WALLIX

[fa icon="comment"] 0 Comments

Cyberthreats are many and varied, which means that cybersecurity measures need to be equally varied and agile in order to truly protect your organization. To provide such agility, the application of two main principles is required when designing and implementing cybersecurity: Least Privilege and Defense in Depth.

Read More [fa icon="long-arrow-right"]

Ensuring Compliance with PAM | Cross-Mapping Security Standards

[fa icon="calendar'] Sep 30, 2019 12:19:11 PM / by WALLIX

[fa icon="comment"] 0 Comments

Because cyberthreats to data and privacy are ubiquitous, cybersecurity needs to be a part of every corporate network – and of course, protecting the personal, financial, health, and other data held by corporations is of paramount importance. Aside from the loss of the data itself, though, executives must also contend with another serious issue: The financial costs of a data breach, in terms of both damage mitigation and the penalties that will be assessed by various governing agencies should the company not have been compliant with appropriate regulations and laws.

Read More [fa icon="long-arrow-right"]

Retail at Risk: Cybersecurity Challenges and Solutions

[fa icon="calendar'] Aug 22, 2019 4:00:16 PM / by WALLIX

[fa icon="comment"] 1 Comment

Whether a multinational giant like Amazon, or a more regionalized company like Safeway, retail systems are ubiquitous around the world. But just as ubiquitous are cyberattacks – and many of those attacks are aimed directly at retail systems, with 64% of retailers reporting an attempted attack on a monthly basis.

Read More [fa icon="long-arrow-right"]