New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

The Year of the RAT: Benefit Safely from SaaS and External Collaboration

[fa icon="calendar'] Apr 30, 2020 12:25:24 PM / by Eric Gaudin

[fa icon="comment"] 0 Comments

You want want your employees to benefit from best-in-class SaaS services, or to use the latest technological equipment. But, you're concerned by the security challenges tied to new technologies, and by the exposure of your infrastructure to external connections. The news is full of stories on recent hacks achieved through external contractor access or illegal access to internal systems.

Read More [fa icon="long-arrow-right"]

IdaaS and Access: Don't be kicked out by the VIP bouncer

[fa icon="calendar'] Apr 8, 2020 8:10:07 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

If you're not on the list, you can’t get in.

Read More [fa icon="long-arrow-right"]

The Year of the RAT: Don’t let your IT turn into a RAT’s nest

[fa icon="calendar'] Mar 31, 2020 11:41:10 AM / by Eric Gaudin

[fa icon="comment"] 0 Comments

The first blog of this series established that well-planned cybersecurity is necessary to achieve sustainable protection against the mutating threats that are Remote Access Trojans (RATs). We also identified how local protections through endpoint solutions can effectively contain malware.

Read More [fa icon="long-arrow-right"]

Endpoint Privilege Management: A New Generation of 007

[fa icon="calendar'] Mar 26, 2020 6:46:36 PM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 1 Comment

Contrary to popular belief, cyberattacks are not (always) a massive attempt to take over or disable your infrastructure. While a wide DDOS attack can be used as a decoy, the real work is more subtle, more elaborate. Consider a James Bond film, for example. The bad guy would try to infiltrate your organization quietly, identify its weaknesses, and attempt to gain power gradually in order to fulfill his villainous plan.

Just as in those Bond movies, broad, external defenses are not enough, and usually countermeasures come too late to stop the infiltration. This is especially true for fragmented organizations and enterprises relying heavily on external contractors and employees working remotely. Once an enemy has found his way in, the whole organization falls. With 69% of breaches perpetrated by outsiders like organized criminal groups and nation-states, it takes a special problem-solver like 007 to save the day.

Read More [fa icon="long-arrow-right"]

Year of the RAT: Keep your business out of the reach of RATs

[fa icon="calendar'] Mar 4, 2020 11:12:15 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

2020 is the Year of the Rat, so we're kicking the year off with everything you need to know about the nefarious RATs... Remote Access Trojans. In the first post, we described a RAT's capabilities and the necessary steps to take in order to protect your infrastructure against this type of cyberattack. In this second installment, we're taking a look at just how much of a threat a RAT is to your system.

Read More [fa icon="long-arrow-right"]

to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security