<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Addressing MSSP Cybersecurity Challenges with Privileged Access Management

[fa icon="calendar'] Mar 20, 2018 11:58:25 AM / by WALLIX posted in Controlling Third Party Access, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Outsourcing of security is on the rise. The MSSP business grew into a $9 billion category in 2017, and Gartner reports that over 50% of organizations will be outsourcing some or all of their security work to Managed Security Service Providers (MSSPs) by next year. 

Read More [fa icon="long-arrow-right"]

Improving Cloud Security Using Privileged Access Management (PAM)

[fa icon="calendar'] Mar 6, 2018 8:59:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

More and more organizations are making the jump to the cloud in an effort to simplify IT and business management. Although this move can make it easier for organizations to scale operations and have more agility to evolve based on the market, it leaves them vulnerable to an ever-growing range of cyber threats. In order to reap the benefits of utilizing cloud environments while protecting organizations from attack, teams need Privileged Access Management (PAM).

Read More [fa icon="long-arrow-right"]

Facing the Global Cybersecurity Skills Shortage

[fa icon="calendar'] Mar 1, 2018 8:45:00 AM / by Elizabeth Vincent posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

How do you beef up cybersecurity if you can’t find qualified personnel to take on the task? This is the question many organizations are asking the world over as a result of a global shortage of cybersecurity skills.

Read More [fa icon="long-arrow-right"]

Thought Leaders Speak: Be secure by combining simplicity with a robust cybersecurity solution

[fa icon="calendar'] Feb 20, 2018 9:01:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

“Simplicity is the ultimate sophistication.” ~ Leonardo da Vinci

Take it from Leonardo (Not DiCaprio. The other one.) Simplicity makes a work of art that much more sophisticated and beautiful. The same is true in technology. Simplicity is elegant. Simplicity sells. Simplicity also makes for effective security.  Indeed, the IT world has only grown more overwhelming since the noted security expert Bruce Schneier remarked in 2001, “Complexity is the enemy of security. As systems get more complex, they get less secure.”

Read More [fa icon="long-arrow-right"]

SSH agent-forwarding: going barefoot (socket-less)

[fa icon="calendar'] Nov 24, 2017 11:28:50 AM / by Eric Gaudin posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Would you really wear sockets with flip flops to walk on a nice sandy beach? The same thing goes with SSH agent-forwarding: using a socket can sometimes be inappropriate.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security