<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Are you really reading all those log reports?

[fa icon="calendar'] Sep 8, 2015 3:00:00 PM / by WALLIX posted in WALLIX Products, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Compliance says that we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?

Read More [fa icon="long-arrow-right"]

Aviva “revenge” hack highlights the risk from third party vendor

[fa icon="calendar'] Sep 3, 2015 5:38:54 PM / by WALLIX

[fa icon="comment"] 0 Comments


A man was jailed for 18 months at the end of August for hacking into 900 phones belonging to insurance company Aviva.

Read More [fa icon="long-arrow-right"]

US Government prioritises Privileged Users in response to huge data breach

[fa icon="calendar'] Aug 19, 2015 3:50:00 PM / by WALLIX

[fa icon="comment"] 0 Comments

In June, the United States Office of Personal Management (OPM) announced that it was the target of a hack. It was originally estimated that 4 million individuals were affected, in July that estimate was revised upwards to 21.5 million.

Read More [fa icon="long-arrow-right"]

Don’t know how your data breach happened? Your cyber insurance could be worthless

[fa icon="calendar'] Jul 14, 2015 1:53:34 PM / by WALLIX posted in Mitigating External Attacks, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

 
For the information security professional a data breach is the worst case scenario but must also be considered an occupational hazard.

Read More [fa icon="long-arrow-right"]

What is cloud account hijacking?

[fa icon="calendar'] Jul 2, 2015 12:30:00 PM / by WALLIX

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security