Amazon Web Services (AWS) present a good news story for service providers, but security challenges remain. AWS gives service providers a way to grow their businesses without having to deal with many of the hassles and costs of maintaining a cloud infrastructure. A Managed Security Services Provider (MSSP), for instance, can let AWS do the heavy lifting for them, supplying an essentially infinitely scalable infrastructure.
WALLIX
Recent Posts
Privileged Access Management (PAM) for MSSPs Using AWS
[fa icon="calendar'] May 2, 2018 9:00:00 AM / by WALLIX posted in Mitigating External Attacks
The CISO’s Guide to Security Compliance (with PAM)
[fa icon="calendar'] Apr 24, 2018 9:00:00 AM / by WALLIX posted in Reaching IT Compliance, Optimizing Cyber-Insurance
With major data breaches flooding the news and high-stakes security regulations coming into effect (looking at you, GDPR and NIS Directive), CISOs worldwide are scrambling.
Azure Security Monitoring and Privileged Access Management (PAM)
[fa icon="calendar'] Apr 17, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Microsoft Azure offers broad, exciting new capabilities for enterprise IT. The new Azure IoT Hub, which enables large-scale deployment of Internet of Things devices, is just one example. The IoT Hub, however, presents a number of challenges, such as security monitoring on Azure.
Test your Cybersecurity Skills: Take the Quiz!
[fa icon="calendar'] Apr 12, 2018 10:56:38 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks
Did you know that the greatest threat your organization faces is from your own privileged users? Intentionally or not, employees and 3rd-party providers with privileged accounts represent your most significant vulnerability to cyber attacks.
Why Retailers need Privileged Access Management | PAM for Retail
[fa icon="calendar'] Apr 10, 2018 8:45:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance
Cybersecurity is a growing issue for businesses worldwide, as the data they handle becomes more and more significant and the threat of a breach more imminent. Nowhere is this challenge more evident than in the Retail sector, where systems are widespread and consumer data handling is constant.