The State of UK Cyber Security Attacks in 2022
Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.
Boosting Cyber Resilience
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Implementing Zero Trust with Osirium products
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
CyberUK 2021 Highlights
A summary of the recent CyberUK 2021 conference, including protecting the NHS and education sector from ransomware.
Protecting backups with PAM
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Simplifying Digital Security and Protection Compliance in the NHS
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
How ready are you for a Cyber Essentials assessment?
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
NCSC Annual Report: The need for Privileged Access Management (PAM)
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
Patch Tuesday Made Easy - With Privileged Process Automation
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
Imagine If Recertification Was Easy
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
PIM, PUM and PAM explained
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
Instant Internal Auditing with PAM, SIEM and Slack
For many organisations, Slack has become the central core of communications between processes and people.
Auditing Privileged Access Management
Where would the investor confidence be without the governance...
Privileged Access Management and Essential Services
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Why PAM should be on every Operations Managers’ wish list
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
Using Elastic Stack with the Osirium Privileged Management Platform
Here’s the How-To video for using Osirium's PxM Platform with Elastic Stack.
When the boss won’t budget for Privileged Access Management (PAM)
What would a data breach cost your business?
The rise and rise in cyber fraud (The ‘Insider Threat’)
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Cyber Essentials: the basics, and exactly why it is essential to you and your business
Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability
Notes from the Fraud Tube Spring Event
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
World Economic Forum Rates Cyber Attack Risk
We’ve reworked the data to show both the risks in terms of impact and probability along with the trends
Tesco Bank resumes normal service, but has the damage been done…?
Who can blame consumers now for being reluctant to switch from the Big Four?
Creating resilience through security cells
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
Early versus late data breach outcomes
We spent some time looking at the outcomes for companies that were the victims of cyber breaches
The JPMorgan Breach and the Problem with Passwords
Earlier this week US investigators charged three men after a multi-year cybercrime campaign
The year of the weekly data breach
Data breaches have fast become the scourge of modern enterprise
US Government’s 30-Day Authentication Sprint Points the Way for UK Firms
The US OPM hack exposed – potentially to a nation state
How to present Cyber Security issues to the Board
If you’ve never attended a board meeting before I’ll try to give you a flavour of what happens
CISO Message to the Board about Breaches
Influence is often limited in the face of perceived business requirements
Hacking Team: Another Reason to Ditch Out-of-Date Password Systems
At Osirium, we believe in the need for a new approach to authentication
How Osirium defends against real world attacks
Dealing with the Insider and Third Party threats
What We Can Learn From the OPM Breach
Why are account credentials from privileged users so sought-after by attackers?
How Osirium PAM defends against real world attacks
There is a serious threat against privileged accounts
Protecting POS: Why You Need to Guard Privileged Remote Accounts
Hackers have infiltrated POS systems via third party providers
PuTTY Problems: Solving Threats with Privileged User Management
IT leaders must consider their department as a major target for advanced attackers and take appropriate steps to mitigate that risk
What is Shoulder Surfing?
Shoulder surfing, as the name suggests is the nefarious art of reading a sensitive piece of information over a user’s shoulder.
Privileged Account Abuse, Not Smartphone ‘Bans’ The GCHQ Story
Much of the talk in IT security circles over the past week has been centred around new guidance for businesses from the UK’s spy agency.
Targeted Attacks – The Fight Back Starts with Good Password Management
Targeted attacks have been around for probably a lot longer than many people think
Passwords aren’t the problem – people are
When the passwords meet people that the security breaks down
Osirium is great for meeting MAS/TRM compliance
Since the Monetary Authority of Singapore issued their Technology Risk Management Guidelines they have achieved a lot of traction with compliance officers.
Where Osirium fits into the Cyber Security Market
In today’s hybrid-cloud era, the privileged insider and outsider have become inter-changeable
15 Minute Security Fix
Here’s a quick security fix on how to reduce risk for your team’s shared accounts in just 15 minutes.
Protecting MSSQL from the Insider threat
IT Security is a very wide ranging subject. At Osirium we like to think of its application to the business stack.
Why do IT administrators want centralised management?
Why do IT administrators want centralised management?
UK businesses admit to over-privileging IT staff
UK businesses admit to over-privileging IT staff - find out why it's not a good idea!
Serious Data Breach Threats from Inadequate “end-of-life” IT Procedures
UK organisations aren’t certain that all data and settings are deleted from devices prior to disposal.