Compliance says that we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?
WALLIX
Recent Posts
Are you really reading all those log reports?
[fa icon="calendar'] Sep 8, 2015 3:00:00 PM / by WALLIX posted in WALLIX Products, Reaching IT Compliance
Aviva “revenge” hack highlights the risk from third party vendor
[fa icon="calendar'] Sep 3, 2015 5:38:54 PM / by WALLIX
A man was jailed for 18 months at the end of August for hacking into 900 phones belonging to insurance company Aviva.
US Government prioritises Privileged Users in response to huge data breach
[fa icon="calendar'] Aug 19, 2015 3:50:00 PM / by WALLIX
In June, the United States Office of Personal Management (OPM) announced that it was the target of a hack. It was originally estimated that 4 million individuals were affected, in July that estimate was revised upwards to 21.5 million.
Don’t know how your data breach happened? Your cyber insurance could be worthless
[fa icon="calendar'] Jul 14, 2015 1:53:34 PM / by WALLIX posted in Mitigating External Attacks, Optimizing Cyber-Insurance
For the information security professional a data breach is the worst case scenario but must also be considered an occupational hazard.
What is cloud account hijacking?
[fa icon="calendar'] Jul 2, 2015 12:30:00 PM / by WALLIX