<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Cloud Password Management with PAM

[fa icon="calendar'] Apr 5, 2018 11:01:22 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Confidence in cloud security is growing. According to the Ponemon Institute’s 2018 Global Cloud Data Security Study, the percent of IT managers who feel that it is difficult to secure confidential or sensitive information in the cloud has fallen from 60% in 2016 to 49% today. That trend notwithstanding, many in the industry still feel cloud security is difficult to achieve. The same study reveals that 71% of IT managers believe is more difficult to apply conventional information security in the cloud computing environment, while 51% think it is more difficult to control or restrict end-user access.

Read More [fa icon="long-arrow-right"]

Picking a PAM Solution

[fa icon="calendar'] Mar 28, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Imagine a hacker is lurking inside your network. Indeed, it’s likely a few malicious actors are already inside your domain despite your best efforts to keep them away. Now, imagine the hacker stealing the credentials of a trusted system administrator. With the back-end access permitted to this privileged user, imagine the kind of damage the hacker can do.

Read More [fa icon="long-arrow-right"]

Strengthening Cyber Resilience Through Privileged Access Management

[fa icon="calendar'] Mar 15, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Cyber resilience refers to how well an organization can recover from a cyber incident. Many factors contribute to success with cyber resilience, but any attempt to achieve cyber resilience should prominently feature Privileged Access Management (PAM).

Read More [fa icon="long-arrow-right"]

Cyber Interview: SPAM Email and GDPR

[fa icon="calendar'] Mar 13, 2018 10:59:53 AM / by Elizabeth Vincent posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

While SPAM email has been flooding our inboxes for many years now, what do we really know about who’s sending them and where they come from? And how is SPAM impacted by the upcoming – and increasing – data privacy and security regulations states are implementing worldwide?

Read More [fa icon="long-arrow-right"]

The Cyber Interview: Keys to reinforcing security by design

[fa icon="calendar'] Jan 18, 2018 6:38:43 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

During an earlier interview on the challenges relating to security by design and connected objects (IoT), Julien Patriarca, Professional Services Director at WALLIX and cybersecurity expert for more than a decade, tackled the issue of responsibility with regard to security.

Read More [fa icon="long-arrow-right"]