Microsoft Azure offers broad, exciting new capabilities for enterprise IT. The new Azure IoT Hub, which enables large-scale deployment of Internet of Things devices, is just one example. The IoT Hub, however, presents a number of challenges, such as security monitoring on Azure.
Azure Security Monitoring and Privileged Access Management (PAM)
[fa icon="calendar'] Apr 17, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Test your Cybersecurity Skills: Take the Quiz!
[fa icon="calendar'] Apr 12, 2018 10:56:38 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks
Did you know that the greatest threat your organization faces is from your own privileged users? Intentionally or not, employees and 3rd-party providers with privileged accounts represent your most significant vulnerability to cyber attacks.
Why Retailers need Privileged Access Management | PAM for Retail
[fa icon="calendar'] Apr 10, 2018 8:45:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance
Cybersecurity is a growing issue for businesses worldwide, as the data they handle becomes more and more significant and the threat of a breach more imminent. Nowhere is this challenge more evident than in the Retail sector, where systems are widespread and consumer data handling is constant.
Cloud Password Management with PAM
[fa icon="calendar'] Apr 5, 2018 11:01:22 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Confidence in cloud security is growing. According to the Ponemon Institute’s 2018 Global Cloud Data Security Study, the percent of IT managers who feel that it is difficult to secure confidential or sensitive information in the cloud has fallen from 60% in 2016 to 49% today. That trend notwithstanding, many in the industry still feel cloud security is difficult to achieve. The same study reveals that 71% of IT managers believe is more difficult to apply conventional information security in the cloud computing environment, while 51% think it is more difficult to control or restrict end-user access.
Will you survive your next security audit?
[fa icon="calendar'] Apr 3, 2018 2:04:03 PM / by WALLIX posted in Preventing Insider Threat, Optimizing Cyber-Insurance
A security audit is something that every single company with an internet connection, and that handles customer/individual data should be concerned with. Without elaborating more than necessary, recent regulations makes it, if not mandatory, at least strongly recommended to audit your IT security to ensure compliance.