A review of the key elements of an effective cybersecurity plan to help security managers prevent or mitigate the impact of a breach.
WALLIX
Recent Posts
Elements of an Effective Cybersecurity Plan
[fa icon="calendar'] Feb 10, 2017 10:36:24 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Cyber Interview: 3 Steps to Implement Privileged Access Management
[fa icon="calendar'] Feb 7, 2017 5:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks
In the world of cybersecurity, Privileged Access Management (PAM) solutions are increasingly attractive to companies and organizations. PAM solutions help protect their most sensitive data and systems from cyber threats.
But how do you properly implement these solutions? Our cybersecurity expert outlines 3 critical steps to privileged access management in this exclusive interview.
Cloud IT Security: PAM in an Agile World
[fa icon="calendar'] Jan 31, 2017 5:41:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
We are now firmly in the era of agile software methodology and cloud hosting. New incarnations of the agile methodology continue to emerge regularly, promising greater flexibility and economy for the IT department as well as greater strategic agility for the business. But these processes also introduce new risks...
How can we combat threats linked to privileged users?
[fa icon="calendar'] Jan 26, 2017 6:13:23 PM / by WALLIX posted in Preventing Insider Threat
While cyber threats are increasing in today’s digital world, they are more and more often linked to privileged users. Why is that? What can be done about it? We asked these questions to Julien Patriarca, cybersecurity expert and Support and Services Manager at WALLIX.
ICS cybersecurity: PAM and securing Industrial Control Systems
[fa icon="calendar'] Jan 23, 2017 12:22:05 PM / by WALLIX posted in Mitigating External Attacks
Industrial entities typically run two parallel sets of information technology systems: Corporate IT and Industrial Control Systems (ICS). Due to the proprietary nature of most ICSs and their unique usage requirements, ICSs tend to have quite different security capabilities from their corporate IT brethren.