<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Privileged Accounts - Prime Targets At Privileged Brands

[fa icon="calendar'] Sep 28, 2016 4:50:10 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

 

It seems the bigger the brand, the bigger the challenge for external threats to win brownie points amongst their peers. External threats are taking up the challenge to break through the perimeter and target highly prized privileged accounts that often exist on networks in unprotected Word or Excel documents. With access to these accounts a compromise becomes that much easier.

Read More [fa icon="long-arrow-right"]

UK sees 14 percent increase in local government data breaches

[fa icon="calendar'] Sep 6, 2016 10:58:05 AM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Despite global IT security spending peaking in 2016 at $81billion which represents a 7.9 percent increase on 2015, local government organisations in the UK have seen a 14 percent increase in the number of reported data breaches. Local government was second only to the UK health sector when measured by the total number of reported data breaches.

Read More [fa icon="long-arrow-right"]

Privileged Access Management (PAM) and Moving Operations into the Cloud

[fa icon="calendar'] Aug 2, 2016 7:11:31 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

"In preparing for battle I have always found that plans are useless, but planning is indispensable.”
Dwight D. Eisenhower

 

Read More [fa icon="long-arrow-right"]

Cloud Security: Making it Work with PAM

[fa icon="calendar'] Jul 28, 2016 7:00:00 AM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

As enterprises embrace a mix of cloud and on-premises deployments of key IT assets, they are using PAM for hybrid cloud security.

Read More [fa icon="long-arrow-right"]

Are UK Health Service Breaches Being Taken Seriously?

[fa icon="calendar'] Jul 26, 2016 12:47:38 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Are the ICO and health service taking data breaches seriously?

Well, frankly, no. And here's why. 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security