The NIS regulations are tightening. NIS2 means stricter rules, reporting requirements, and sanctions.
Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
A summary of the recent CyberUK 2021 conference, including protecting the NHS and education sector from ransomware.
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
For many organisations, Slack has become the central core of communications between processes and people.
Where would the investor confidence be without the governance...
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
Here’s the How-To video for using Osirium PAM with Elastic Stack.
What would a data breach cost your business? How to justify investment in PAM
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
We spent some time looking at the outcomes for companies that were the victims of cyber breaches
Earlier this week US investigators charged three men after a multi-year cybercrime campaign
Data breaches have fast become the scourge of modern enterprise
The US OPM hack exposed – potentially to a nation state
If you’ve never attended a board meeting before I’ll try to give you a flavour of what happens
Influence is often limited in the face of perceived business requirements
Dealing with the Insider and Third Party threats
Shoulder surfing, as the name suggests is the nefarious art of reading a sensitive piece of information over a user’s shoulder.
Much of the talk in IT security circles over the past week has been centred around new guidance for businesses from the UK’s spy agency.
Targeted attacks have been around for probably a lot longer than many people think
In today’s hybrid-cloud era, the privileged insider and outsider have become inter-changeable
IT Security is a very wide ranging subject. At Osirium we like to think of its application to the business stack.
If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.