There’s no doubt that awareness of information security in corporations has dramatically improved in recent years. Stories of breaches, both internal and external, have filled the media. Where the CEO has been forced to face the music on the evening news, where most people now understand the value of data and the risk of it falling into the wrong hands.
WALLIX
Recent Posts
Building A Robust Cybersecurity Culture
[fa icon="calendar'] Aug 11, 2016 10:34:04 AM / by WALLIX posted in Preventing Insider Threat
Monsters Are Real, Insider Ghosts Are Too
[fa icon="calendar'] Aug 10, 2016 7:30:00 AM / by WALLIX posted in Preventing Insider Threat
Insider threats are very real. Hackers are perceived as being faceless guys that wear hoods. The insider is your colleague, your friend a member of your team. Working with third party companies and contractors is a fact of life.
Privileged Access Management and BREXIT
[fa icon="calendar'] Aug 4, 2016 6:00:00 AM / by WALLIX posted in Reaching IT Compliance
Certain events are so overwhelming that only a touch of humor can keep us from going mad. BREXIT, Britain’s exit from the European Union, is one of them. This decision is likely to have a serious impact on IT security, especially Privileged Access Management (PAM).
Privileged Access Management (PAM) and Moving Operations into the Cloud
[fa icon="calendar'] Aug 2, 2016 7:11:31 PM / by WALLIX posted in Mitigating External Attacks
"In preparing for battle I have always found that plans are useless, but planning is indispensable.”
Dwight D. Eisenhower
Cloud Security: Making it Work with PAM
[fa icon="calendar'] Jul 28, 2016 7:00:00 AM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance
As enterprises embrace a mix of cloud and on-premises deployments of key IT assets, they are using PAM for hybrid cloud security.