New PAM release further improves efficiency and resilience
Osirium has launched its latest PAM update to help enhance efficiency and resilience even more
Enhanced solutions in 2023 to combat the evolving cyber threat
Exploring the subject of rising threats from cyber criminals and ransomware attacks.
The Evolution of PAM
PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future
Ransomware Payload Types Including Brickers and Wipers
Ransomware covers many different types of attack, the latest being "Brickers" and "Wipers" find out more and how to defend against them in this blog.
Dirty Pipe Vulnerability (CVE-2022-0847)
Osirium products are not affected by the so-called "Dirty Pipe" vulnerability, here are the details.
Boosting Cyber Resilience
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Linux PolicyKit vulnerability no risk for Osirium PAM
Long-term vulnerability in Linux poses no risk for Osirium PAM
Launch of Osirium's PAM v8.0 - MFA, JIT, and lots more
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
Passwordless Authentication for PAM with Authlogics
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
MSPs and Ransomware - the weakest link
MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients
Are businesses doing enough to protect against ransomware?
New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...
Record High Costs of Data Breach
The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.
Implementing Zero Trust with Osirium products
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
Supply Chain Threats And MSPs
Many organizations depend on MSPs and MSSPs. This article discusses why MSP security is critical to protect themselves and their clients.
Ransomware: The threat and blocking lateral movement
Understanding the threat and blocking lateral movement from ransomware
Securing Remote Access with Osirium PAM
Remote access to IT systems for staff and third-parties needs to be approached carefully - see why Privileged Access Management (PAM) is key to working safely
Taking PAM To The Next Level With Automation
Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.
What is Privileged Access Security?
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
Protecting backups with PAM
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Welcome to 2021 - What's on Your New Year Plan?
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
Don't Be The Next Malware Victim
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
Simple DSP Compliance in the NHS
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
Cloud MFA for PAM with RSA
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
How ready are you for a Cyber Essentials assessment?
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
NCSC Annual Report: The need for Osirium's PAM
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
IAM v PAM - best option for user security?
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
A bad week for universities targeted in cyberattacks
There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?
Privileged Access Security - A Deeper Dive
Privileged Access Security should be a priority. Osirium CTO, Andy Harris, explains why and lays out the roadmap for a solution.
Some Inconvenient Truths About Credentials and Remote Access
In general VPN access is more risky than office based access, and there are some uncomfortable truths about humans and credentials.
PIM, PUM and PAM explained
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
Introducing Osirium PAM v7.0
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Secure Remote Privileged Access for Free
Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.
Instant Internal Auditing with PAM, SIEM and Slack
For many organisations, Slack has become the central core of communications between processes and people.
PAM - Fault-Tolerant and Highly-Available
We’re often asked about high availability and fault tolerance for Osirium PAM
Introducing PXM Platform 6.5 – What’s New?
PXM Platform reaches v6.5, see what's new
Auditing Privileged Access Management
Where would the investor confidence be without the governance...
Five Reasons Why You'll Sleep Better with Osirium's PAM
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Multi-Factor Authentication: Osirium PAM and OneLogin
Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out
Infosec 2019 – Bigger than ever for Osirium
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
Privileged Access to Web Apps – A Magical Solution
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
Securing Third Party Access
There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks
Privileged Access Management and Essential Services
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Thoughts on Cloud and Cyber Security Expo 2019
Reflections on Cloud and Cyber Security Expo 2019
PAM – The secret to CI and DevOps Success explained
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
Privileged Access Management – Common Use Cases
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
Sharing Privileged Accounts With Third Parties
In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.
IoT, Internet of Things is not a good term…
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
What are the different approaches to digital transformation
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
Osirium and RazorSecure Strategic Alliance
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
How to separate your business from cyber-attacks
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.
Multi-factor Authentication in Osirium PAM 6.1.0
Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
Using SSH Keys for Authentication in PAM
Osirium PAM can use both passwords and SSH Keys for the role-based connections where the device supports keys.
DevOps guide to Privileged Account & Credential Security
DevOps is hard enough, don't let the risk of exposing credentials make it worse.
Why PAM should be on every Operations Managers’ wish list
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
PAM Express Introductory Video Series
A new set of tutorial videos to get you up and running fast with Osirium PAM Express
The education sector must be educated on cyber-security
Across all industries, cyber-attacks continue to grow in number and severity. The education sector is becoming particularly targeted.
Why you shouldn’t be complacent about cloud security
More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.
Database Task Automation for Asterisk (AsteriskNOW)
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Analysts recognise Osirium’s Task Automation innovation
Task automation has played an integral part in the Osirium PAM since its very inception in 2008.
Using Elastic Stack with PAM
Here’s the How-To video for using Osirium PAM with Elastic Stack.
Implementing the Dual Account model with Osirium PAM
The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.
Meeting significant GDPR needs using Osirium’s PAM
Here’s the problem for Osirium; Every cyber security company out there is suggesting that they address GDPR requirements.
Benefits for the Board when you choose Osirium’s PAM
Osirium's PAM provides many business benefits that will keep the Board happy.
Responding to the unique needs of M(S)SP’s
Managed Security Service Providers face differing challenges to other industries we serve. With GDPR on the horizon, we discuss these unique needs.
Building a coping mechanism for data breaches
Breaches may be daily news, but they will always be a significant worry for business stakeholders
Cybersecurity – Making it everyone’s business is futile
Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security
NHS Cybersecurity #2: People and Passwords
NHS seeks to improve, the outsourcing of IT contracts has increased, and data security controls that should protect staff and patients
So Why Privileged Account Management (PAM)?
Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls
Least Privileged Model with PAM
Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do
MAP Server – Protecting legacy applications
At Osirium, we created our Management Application Proxy Server (MAP Server)
Cybersecurity in the NHS #1: Protecting the NHS
A colossal 40% of malware attacks in the UK are made against public sector institutions
When the boss won’t budget for PAM
What would a data breach cost your business? How to justify investment in PAM
When your biggest problems solved, you look to the next one
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
So What’s Wrong with Blacklisting Commands?
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences
The rise and rise in cyber fraud (The ‘Insider Threat’)
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Notes from the Fraud Tube Spring Event
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
Watching The Insider Threat: So Why Privileged Access?
The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence
Osirium PAM ServiceNow Integration
Taking Privileged Access Management (PAM) one step higher in security and compliance
Creating resilience through security cells
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
The Cost of Uncertainty
Today we’re hearing about the aftermath of an attack
Early versus late data breach outcomes
We spent some time looking at the outcomes for companies that were the victims of cyber breaches
IAM Round Table Notes
Yesterday we attended a round table session about building effective Identity and Access Management solutions
The JPMorgan Breach and the Problem with Passwords
Earlier this week US investigators charged three men after a multi-year cybercrime campaign
The year of the weekly data breach
Data breaches have fast become the scourge of modern enterprise
Separating people from passwords
Rigorous password policies are creating the exact opposite of their intended outcome
Osirium as an Identity Federator
The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.
Want to Follow GCHQ’s Best Practise Password Advice?
If the documents leaked by NSA whitsleblower Edward Snowden are anything to go by, GCHQ knows a thing or two about exploiting security weaknesses.
US 30-Day authentication sprint points the way
The US OPM hack exposed – potentially to a nation state
Highlighting the weakness of human generated passwords
Passwords are one of the biggest threats to enterprise data security around today
How to present Cyber Security issues to the Board
If you’ve never attended a board meeting before I’ll try to give you a flavour of what happens
Why do IT administrators want Identity & Access Management?
IAM provides a wealth of operational conveniences alongside its security benefits
CISO Message to the Board about Breaches
Influence is often limited in the face of perceived business requirements
How Osirium defends against real world attacks
Dealing with the Insider and Third Party threats
What is Shoulder Surfing?
Shoulder surfing, as the name suggests is the nefarious art of reading a sensitive piece of information over a user’s shoulder.
GCHQ - Privileged Account Abuse
Much of the talk in IT security circles over the past week has been centred around new guidance for businesses from the UK’s spy agency.
Targeted Attacks: Fight Back with password management
Targeted attacks have been around for probably a lot longer than many people think
Take Care with Third Parties
Do you feel confident about the security of your corporate account access controls?
Why do IT administrators want automation?
So why did a large proportion of administrators think that automation would make their life easier?