<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Compliance - A route to better your business

[fa icon="calendar'] May 12, 2016 5:12:40 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Really, though…

Today in business, digital storage, communication and transporting data across borders are the norm and we’re seeing an increase in regulation and compliance in various forms.

 

Read More [fa icon="long-arrow-right"]

General Data Protection Regulation: May Day, May Day

[fa icon="calendar'] May 3, 2016 9:23:48 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 4 Comments

Well, the 5th to be precise, but here’s why you should be panicking…

 

Read More [fa icon="long-arrow-right"]

SOX Compliance. It’s Not Just Another US Thing

[fa icon="calendar'] Apr 28, 2016 7:00:00 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 1 Comment

 

It feels like every week there are fresh headlines about hackers bringing organisations to their knees, and such stories always seem to be front-page news. In 2002, following a wave of high profile financial scandals driven by fraudulent accounting practices involving major US corporations including Enron, the heat was such that the government introduced the Sarbanes Oxley Act, or the SOX Act, in an attempt to restore investor confidence. Cyber-attacks have forced us to change the way we do business, and organisations must now take greater responsibility for cyber security and report cyber breaches. This is both an important and positive step because it enables government agencies to strengthen security and allows individuals to mitigate harm, but it’s only a good thing for your business if you’re prepared…

 

Read More [fa icon="long-arrow-right"]

Is Security Information and Event Management (SIEM) Enough?

[fa icon="calendar'] Apr 4, 2016 2:57:23 PM / by WALLIX posted in WALLIX Products, Reaching IT Compliance

[fa icon="comment"] 1 Comment

Compliance dictates we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?

 

Read More [fa icon="long-arrow-right"]

Cyber Insurance: Is Your Information Worth The Premiums?

[fa icon="calendar'] Mar 31, 2016 5:31:18 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

 

The scale, frequency and magnitude of cyber-crime is truly alarming and getting worse. Recent highly publicised attacks have served to push the issue much further up the management agenda to the extent that only the foolhardy would now argue that cyber-security is not a board level issue.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security