Privacy and Security By Design: What IoT Manufacturers Need To Know
[fa icon="calendar'] Jan 30, 2019 7:13:00 PM / by WALLIX posted in Mitigating External Attacks
2018 Breaches: How PAM Could Have Helped Prevent the Worst of Them
[fa icon="calendar'] Dec 27, 2018 3:30:21 PM / by WALLIX posted in Mitigating External Attacks
There have been quite a few security breaches to hit the news in 2018. As each story broke, it seemed like it couldn't get worse, only to find that the next data breach was just around the corner, and even more severe, exposing the data of millions of customers worldwide. We have had a few of those this year.
What is PAM? | Privileged Access Management
[fa icon="calendar'] Oct 18, 2018 10:08:06 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance
Privileged access management, or PAM, is software that helps organizations maintain complete control and visibility over their most critical systems and data. A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in case of a security breach.
Enterprise Password Management Software: WALLIX Bastion Password Manager
[fa icon="calendar'] Sep 26, 2018 9:09:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Organizational security often begins with password management. Even the most basic of organizations use passwords to protect email accounts and document management solutions, while larger organizations may need to worry about HIPAA compliance, protecting industrial control systems, and more. Ensuring security with robust password management policies is key, and utilizing enterprise password management software, such as the WALLIX Bastion Password Manager, significantly simplifies this daunting task.
Cost of a Data Breach vs. Cost of a Security Solution
[fa icon="calendar'] Sep 19, 2018 10:19:46 AM / by WALLIX posted in Mitigating External Attacks, Optimizing Cyber-Insurance
You can’t spend your way into a strong security posture. Being secure involves integrating tools, policies, people, and budgets. Getting secure will absolutely require some expenditure of cash. How much is the right amount? The answer depends on each organization’s unique security needs. In general, though, the best practice is to assess the potential financial impact of an incident (data breach cost) and weigh it against the cost of staying secure through breach prevention. Figuring this out can be a bit challenging, but it can be done.