<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Access Management Platform | WALLIX Access Manager

[fa icon="calendar'] Jan 9, 2018 9:42:47 AM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 2 Comments

Benefiting from an Access management platform is a key component of a comprehensive cybersecurity strategy.

Read More [fa icon="long-arrow-right"]

Reducing the Cost of a Data Breach with Privileged Access Management (PAM)

[fa icon="calendar'] Dec 26, 2017 3:12:11 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

If the 19th century poet Elizabeth Barrett Browning had been asked about cybersecurity, she might have written, “How does a data breach rack up costs? Let me count the ways.” 

Read More [fa icon="long-arrow-right"]

Worried about breaches? You need a privileged session management suite

[fa icon="calendar'] Dec 19, 2017 4:43:26 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

More than ever before, organizations are getting attacked from all sides. Between malware infested emails and stolen credentials, companies are seriously threatened. 

Read More [fa icon="long-arrow-right"]

ICS Security | Using PAM for Industrial Control Systems Security

[fa icon="calendar'] Dec 7, 2017 5:22:26 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Industrial control systems (ICS) are critical to numerous industry operations and have become high-profile targets for cybercriminals who may infiltrate ICS to cause damage to the systems themselves or use the systems to gain access to other parts of a corporate IT infrastructure.

Read More [fa icon="long-arrow-right"]

Understanding the Uber hack with Privileged Access Management (PAM)

[fa icon="calendar'] Nov 29, 2017 4:08:56 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

  • The data of 57 million users has been stolen from Uber.
  • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data.
Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security