If you don’t lock your door, you can’t get too upset if someone wanders in and steals your stuff. Information security holds by a similar rule.
Privileged Account Management: Deployment Options
[fa icon="calendar'] Mar 16, 2016 3:43:22 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access
New IT Security Challenges for the Financial world
[fa icon="calendar'] Mar 10, 2016 6:32:14 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance
How to ensure Cloud computing security
[fa icon="calendar'] Mar 1, 2016 10:44:13 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks
The public cloud provider business scarcely existed a decade ago. Now, this type of company is at the forefront of a revolution in IT. It’s a varied industry and one that is still evolving dramatically.
Managing Risk of IT Service Providers in Digital Transformation
[fa icon="calendar'] Feb 9, 2016 7:42:38 PM / by WALLIX posted in Controlling Third Party Access
A side effect of digital integration is the growing use of external service providers. The process seems natural, because today’s IT tasks are so complex that organisations work more efficient by outsourcing certain tasks.
Over 70% of UK businesses now using IT contractors
[fa icon="calendar'] Jan 21, 2016 4:44:20 PM / by WALLIX posted in Controlling Third Party Access
There is no doubt that one of the main driving forces contributing to the positive outlook for companies in the UK is the way in which technology has been changing both consumer and commercial activity beyond recognition.