Are the ICO and health service taking data breaches seriously?
Well, frankly, no. And here's why.
[fa icon="calendar'] Jul 26, 2016 12:47:38 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Are the ICO and health service taking data breaches seriously?
Well, frankly, no. And here's why.
[fa icon="calendar'] Jul 20, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access
This third installment of our “PAM for Dummies” series addresses one of the most important security issues you’ve never heard of: the connection between privileged access management (PAM) and identity access management (IAM).
[fa icon="calendar'] Jul 19, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access
We all take it for granted that when we need them, the Police will help "protect and serve" its citizens. But sometimes, only sometimes, they protect and serve themselves with unauthorised insider information about the citizens they are paid to help.
[fa icon="calendar'] Jul 7, 2016 9:01:56 AM / by WALLIX posted in Mitigating External Attacks
The Book of Ecclesiastes reads, “Using a dull ax requires great strength, so sharpen the blade. That's the value of wisdom; it helps you succeed.” (10:10) And it may as well work for information security as InfoSec seems to have many areas of practice where we’re busy cutting down trees with dull axes.
[fa icon="calendar'] Jul 6, 2016 10:47:35 PM / by WALLIX posted in Reaching IT Compliance
Here's why you should be paying attention to GDPR. And this will also certainly interest your investors and shareholders...
WALLIX is a software company offering privileged access management solutions to help enterprises, public organizations and cloud service providers protect their critical IT assets including data, servers, terminals and connected devices.
[fa icon="phone"] Get the right number
[fa icon="envelope"] sales@wallix.com
[fa icon="home"] Find the right location