<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Cyber insurance is here, but will it reward good security?

[fa icon="calendar'] Apr 23, 2015 3:42:31 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Last week the chief of Lloyds of London claimed that his business had seen a 50% increase in demand for cyber insurance products in the first quarter of 2015. The UK government working in partnership with insurance broker Marsh in Marsh has highlighted that around 98% of large UK companies have no form of insurance against a data breach or cyber-attack.

Read More [fa icon="long-arrow-right"]

Security analysts say bad password and user management puts businesses at risk of an insider attack

[fa icon="calendar'] Apr 14, 2015 12:12:36 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 1 Comment

What do you think poses the biggest insider risk in your business? There’s no doubt that the Snowden case has highlighted the danger posed, particularly by those users with elevated privileges and access to sensitive and valuable data.

Read More [fa icon="long-arrow-right"]

Might your system administrator have a god complex?

[fa icon="calendar'] Apr 13, 2015 10:48:24 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments


Here in London the TimeOut magazine is a must read (they also have an awesome blog). One of my favourite weekly features is the hilarious and regularly cringe-worthy: “Overheard in London” #wordonthestreet.

Read More [fa icon="long-arrow-right"]

4 signs your IT worker may have gone rogue

[fa icon="calendar'] Mar 30, 2015 1:24:00 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments


The technology being used in today’s businesses is more powerful than ever. These tools and systems are helping to increase productivity and drive digital transformation. But this increased visibility of IT and its key part in business now sees it under greater scrutiny, especially when it comes to trusting those with access to this now critical infrastructure.

Read More [fa icon="long-arrow-right"]

VIDEO: Approval workflows for painless privileged user management

[fa icon="calendar'] Mar 19, 2015 1:03:05 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 0 Comments

How often do you need to allow one of your external service providers to access one of your critical resources or temporarily increase the privileges of someone in your IT team?

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security