The State of UK Cyber Security Attacks in 2022
Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.
Boosting Cyber Resilience
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Linux PolicyKit vulnerability no risk for Osirium PAM
Long-term vulnerability in Linux poses no risk for Osirium PAM
AutoCAD and Local Admin Accounts - the risk and resolution
Removing the risk of local admin without impacting AutoCAD users
Apache Log4j Vulnerability
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
Passwordless Authentication for PAM with Authlogics
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
MSPs and Ransomware - the weakest link
MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients
Are UK businesses doing enough to protect against ransomware?
New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...
Record High Costs of Data Breach
The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.
Implementing Zero Trust with Osirium products
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
What is Privileged Access Security?
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
Are Privileged Access Management (PAM) and Identity Access Management (IAM) the same?
Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?
Welcome to 2021 - What's on Your New Year Plan?
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
Don't Be The Next Malware Victim
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
Cloudifying Multi-Factor Authentication for Privileged Access Management with RSA
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
IAM v PAM as a single pane of glass for evaluating user security posture
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
A bad week for universities targeted in cyberattacks
There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?
Some Inconvenient Truths About Credentials and Remote Access
In general VPN access is more risky than office based access, and there are some uncomfortable truths about humans and credentials.
Introducing Osirium PAM v7.0
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Fault-Tolerant, Highly-Available Privileged Access Management
We’re often asked about high availability and fault tolerance for Osirium PAM
Introducing PXM Platform 6.5 – An overview of what’s new
PXM Platform reaches v6.5, see what's new
Five Reasons Why You’ll Sleep Better with Privileged Access Management
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Multi-Factor Authentication: Osirium PAM and OneLogin
Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out
Infosec 2019 – Bigger than ever for Osirium
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
Privileged Access to Web Apps – A Magical Solution
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
Thoughts on Cloud and Cyber Security Expo 2019
Reflections on Cloud and Cyber Security Expo 2019
Privileged Access Management – Common Use Cases
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
IoT, Internet of Things is not a good term…
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
Osirium and RazorSecure Strategic Alliance
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
Separate your business from cyber-attacks – Separate people from passwords
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.
Multi-factor Authentication Improvements in PxM Platform Version 6.1.0
Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
PAM Express Introductory Video Series
A new set of tutorial videos to get you up and running fast
Why you shouldn’t be complacent about cloud security
More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.
Implementing the Dual Account model with Osirium PAM
The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.
Surprising benefits for the Board when you choose Osirium’s PxM
Osirium's PAM provides many business benefits that will keep the Board happy.
Building a coping mechanism for data breaches
Breaches may be daily news, but they will always be a significant worry for business stakeholders
Cybersecurity – Making it everyone’s business is futile
Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security
So Why Privileged Account Management (PAM)?
Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls
Least Privileged Model with Privileged Account Management (PAM)
Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do
MAP Server – Protecting legacy applications
At Osirium, we created our Management Application Proxy Server (MAP Server)
Privileged Access Management delivers the safety net
In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…
Watching The Insider Threat: So Why Privileged Access?
The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence
The Cost of Uncertainty
Today we’re hearing about the aftermath of an attack
IAM Round Table Notes
Yesterday we attended a round table session about building effective Identity and Access Management solutions
Separating people from passwords
Rigorous passwords policies are creating the exact opposite of their intended outcome
Osirium as an Identity Federator
The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.
Want to Follow GCHQ’s Best Practise Password Advice? Look No Further
If the documents leaked by NSA whitsleblower Edward Snowden are anything to go by, GCHQ knows a thing or two about exploiting security weaknesses.
Brute force bugs highlight the weaknesses of human generated passwords
Passwords are one of the biggest threats to enterprise data security around today