<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

SWIFT Network Breach: Was it an inside job?

[fa icon="calendar'] Sep 1, 2016 12:19:45 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

 

Back in February 2016, thieves stole US$81m from the Bangladesh Bank with the possible involvement of an insider. No one broke in, no one wore masks or walked into a bricks and mortar building carrying weapons.

Read More [fa icon="long-arrow-right"]

The shady truth about Shadow IT

[fa icon="calendar'] Aug 30, 2016 4:34:45 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

 


Shadow IT has CIO’s caught between a rock and a hard place, pushed to deliver the required infrastructure for the business to function whilst remaining nimble and innovative to stay ahead of competitors.

Read More [fa icon="long-arrow-right"]

The first step toward change is awareness. The second step is acceptance.

[fa icon="calendar'] Aug 25, 2016 10:38:02 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

 

With an ever evolving regulatory landscape and with increasingly smart technology at our fingertips, it’s probably time we paused to examine the way we’re doing business. Just because it’s been done a certain way for years, it doesn't mean that’s still the right way. Businesses need to start seeing the bigger picture rather than forever playing catch-up, as so many are guilty of thus far. Breaking the cycle means analysing the threats that businesses can anticipate both now and in the coming months and years, and determining the smartest solution for them.

It’s time for change, and real progress. This article examines how and why it’s coming, whether you like it or not, and how to make it work for your business.

Read More [fa icon="long-arrow-right"]

When Trusted Insiders Go Bad

[fa icon="calendar'] Aug 19, 2016 12:47:25 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

A recent survey conducted by Gartner of 186 participants released in May 2016 exposed that the main motivation of trusted employees and contractors (insiders) leaking privileged information is financial. 

Read More [fa icon="long-arrow-right"]

Sage data breach highlights insider threat

[fa icon="calendar'] Aug 17, 2016 11:30:00 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

This week has seen yet another high profile business based in the UK breached, possibly by an insider threat. This time, it’s a trusted business-to-business software provider Sage Group PLC, which provides business management software for accounting and payroll services to companies in 23 countries.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security