<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

The GDPR, One Year In

[fa icon="calendar'] May 23, 2019 4:52:59 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

The EU’s General Data Protection Regulation – or GDPR – has now been in force for a year. Because of the ongoing impact it has on business, this first anniversary is a good opportunity to step back and reexamine GDPR in terms of why it exists and what it calls for, as well as look at a couple of notable non-compliance cases that have already been brought to serve as a reminder – and a warning.

Read More [fa icon="long-arrow-right"]

3 Questions CISOs Should Really Be Asking

[fa icon="calendar'] Apr 10, 2019 11:45:14 AM / by WALLIX posted in Preventing Insider Threat, Reaching IT Compliance, Improving Cybersecurity

[fa icon="comment"] 0 Comments

The key objective of any CISO (Chief Information Security Officer) is the prevention of impact to the organization from any form of security breach. This, as we know, is much easier said than done. A good CISO, in fact, comes to work every morning assuming that a breach has already happened, with a view to fixing any vulnerabilities and securing the system to the highest standard possible. Every single day.

Read More [fa icon="long-arrow-right"]

What is PAM? | Privileged Access Management

[fa icon="calendar'] Oct 18, 2018 10:08:06 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Privileged access management, or PAM, is software that helps organizations maintain complete control and visibility over their most critical systems and data. A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in case of a security breach.

Read More [fa icon="long-arrow-right"]

Agile Regulatory Compliance | Webinar

[fa icon="calendar'] Jun 27, 2018 11:41:49 AM / by Elizabeth Vincent posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Staying agile is crucial in a fast-paced world. Businesses need to move quickly to stay ahead of their competition and react immediately when faced with (cyber) threat. Business processes need to be flexible to allow room for growth and evolution in the needs and shape of the organization.

Read More [fa icon="long-arrow-right"]

12 IT Security Questions You Should Be Asking

[fa icon="calendar'] Jun 20, 2018 9:00:00 AM / by Elizabeth Vincent posted in Reaching IT Compliance, Improving Cybersecurity

[fa icon="comment"] 0 Comments

When it comes to the IT security of your organization, you don’t want to leave anything to chance. These days, the vast majority of businesses worldwide are subject to cyber attack (upwards of 89%, in fact). You can’t risk making it any easier for your critical data to be accessed and stolen.

Read More [fa icon="long-arrow-right"]