The key objective of any CISO (Chief Information Security Officer) is the prevention of impact to the organization from any form of security breach. This, as we know, is much easier said than done. A good CISO, in fact, comes to work every morning assuming that a breach has already happened, with a view to fixing any vulnerabilities and securing the system to the highest standard possible. Every single day.
WALLIX
Recent Posts
3 Questions CISOs Should Really Be Asking
[fa icon="calendar'] Apr 10, 2019 11:45:14 AM / by WALLIX posted in Preventing Insider Threat, Reaching IT Compliance, Improving Cybersecurity
Cybersecurity Simplified: Bastion Managed Services
[fa icon="calendar'] Apr 8, 2019 6:02:00 PM / by WALLIX posted in WALLIX Products, Optimizing Cyber-Insurance
Who better than WALLIX to manage your Bastion?
Privileged Access Management (PAM) is recognized as a critical system for the Digital Transformation, allowing organizations to ensure the security of their critical accounts, as well as assisting in complying with required regulations. In fact, Gartner named PAM as the #1 cybersecurity priority for businesses - 2 years running.
Privacy and Security By Design: What IoT Manufacturers Need To Know
[fa icon="calendar'] Jan 30, 2019 7:13:00 PM / by WALLIX posted in Mitigating External Attacks
What is the Principle of Least Privilege and How Do You Implement It?
[fa icon="calendar'] Jan 22, 2019 12:27:05 PM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity
In the military, they have a well-known phrase that happens to succinctly describe the definition of the least privilege principle: ‘Need-To-Know Basis’. For the military, this means that sensitive information is only given to those who need that information to perform their duty. In cybersecurity, it’s much the same idea. The ‘least privilege’ principle involves the restriction of individual user access rights within a company to only those which are necessary in order for them to do their job. By the same token, each system process, device, and application should be granted the least authority necessary, to avoid compromising privileged information.
2018 Breaches: How PAM Could Have Helped Prevent the Worst of Them
[fa icon="calendar'] Dec 27, 2018 3:30:21 PM / by WALLIX posted in Mitigating External Attacks
There have been quite a few security breaches to hit the news in 2018. As each story broke, it seemed like it couldn't get worse, only to find that the next data breach was just around the corner, and even more severe, exposing the data of millions of customers worldwide. We have had a few of those this year.