<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

5 Reasons Privileged Account Discovery Is the First Step Toward Robust Cybersecurity

[fa icon="calendar'] Feb 27, 2018 8:45:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Hikers have a saying that goes, “The terrain is not the map.” Upon finding, for instance, that a bridge no longer exists, one might ask, “Wait a minute… you mean a US Geological Survey map from 1953 doesn’t reflect current conditions?” “Yup. The terrain is not the map.” So it goes in IT as well.

Read More [fa icon="long-arrow-right"]

Thought Leaders Speak: Be secure by combining simplicity with a robust cybersecurity solution

[fa icon="calendar'] Feb 20, 2018 9:01:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

“Simplicity is the ultimate sophistication.” ~ Leonardo da Vinci

Take it from Leonardo (Not DiCaprio. The other one.) Simplicity makes a work of art that much more sophisticated and beautiful. The same is true in technology. Simplicity is elegant. Simplicity sells. Simplicity also makes for effective security.  Indeed, the IT world has only grown more overwhelming since the noted security expert Bruce Schneier remarked in 2001, “Complexity is the enemy of security. As systems get more complex, they get less secure.”

Read More [fa icon="long-arrow-right"]

SSH agent-forwarding: going barefoot (socket-less)

[fa icon="calendar'] Nov 24, 2017 11:28:50 AM / by Eric Gaudin posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Would you really wear sockets with flip flops to walk on a nice sandy beach? The same thing goes with SSH agent-forwarding: using a socket can sometimes be inappropriate.

Read More [fa icon="long-arrow-right"]

Cyber Insurance: Is Your Information Worth The Premiums?

[fa icon="calendar'] Mar 31, 2016 5:31:18 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

 

The scale, frequency and magnitude of cyber-crime is truly alarming and getting worse. Recent highly publicised attacks have served to push the issue much further up the management agenda to the extent that only the foolhardy would now argue that cyber-security is not a board level issue.

Read More [fa icon="long-arrow-right"]

INFOGRAPHIC: IT teams not convinced on the need for cyber-insurance

[fa icon="calendar'] Nov 19, 2015 11:23:33 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

We recently did some research into the attitudes of the IT departments to cyber-insurance.  Some of our key findings are in this infographic. You can download the full report from here

Read More [fa icon="long-arrow-right"]