Your ransomware readiness report: how do you score?
Ransomware has become a major blight on businesses everywhere. How well prepared is your business?
NHS Digital reveals new MFA rules with focus on privileged accounts
NHS Digital has published new rules requiring all digital systems to have MFA protection, with special focus on accounts with privileged access.
The many faces of Privilege and The Cyber Assessment Framework
Whether it’s the EU’s new NIS2 regulations, the NHS’s DSP guidelines, or Cyber Essentials, the emphasis on the importance of managing privileged access continue
‘Shocking’ cyber insurance demands: are you prepared?
When it comes to obtaining a cyber insurance policy for your organisation you need to be prepared to meet a wide range of requirements.
Major new cyber rules show growing importance of privileged access
The NIS regulations are tightening. NIS2 means stricter rules, reporting requirements, and sanctions.
How do I make the most of EPM?
EPM is a critical cyber security defence, but how can you ensure it gets used and provides the expected protection?
What is EPM and why should I care?
What is endpoint privilege management and how important is it?
New PAM release opens gateway to time-saving automation
The new Osirium PAM 9.0 release is out with great new features, including device discovery.
MOVEit victim list grows as more big names revealed
The number of victims falling prey to the mass hack of the software MOVEit continues to grow.
NIS2 cyber compliance and what it means for UK organisations
The NIS regulations are tightening. NIS2 means stricter rules, reporting requirements, and sanctions.
Cyber insurance, ransomware and the Van Gogh equation
Cyber insurance is becoming an increasingly hot topic and insurers are looking more and more for organisations to have certain key security measures in place.
New NHS cyber strategy identifies dangers of privileged access misuse
The dangers of privileged access misuse are highlighted as a critical concern in a new cyber strategy for the NHS.
New PAM release further improves efficiency and resilience
Osirium has launched its latest PAM update to help enhance efficiency and resilience even more
Dangers of local admin rights: native Azure AD (Entra ID) support arrives for PEM
Allowing employees to have local admin rights is fraught with dangers for all firms. But Osirium PEM, now with 100% native Azure AD support, offers a solution.
Enhanced solutions in 2023 to combat the evolving cyber threat
Exploring the subject of rising threats from cyber criminals and ransomware attacks.
Education a target for ransomware in 2023
Is education a prime target for ransomware attackers in 2023?
Can Developers be productive without Local Admin?
Developers need local admin rights on their workstations, but that's risky. See how that risk can be removed by using Privileged Endpoint Management (PEM)
Preventing ransomware from being devastating
The ransomware attack at MediBank has many of the classic elements of a ransomware attack. How could they be avoided?
Automation: Taking Cybersecurity to a New Level
Automation is the key to better cybersecurity and better IT service. Find out how in this blog.
The Evolution of PAM
PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future
Ransomware Payload Types Including Brickers and Wipers
Ransomware covers many different types of attack, the latest being "Brickers" and "Wipers" find out more and how to defend against them in this blog.
A real-world example of "shift left" IT support
Most IT Help Desks would love to let users do more for themselves - as long as it was safe. Read how it's possible with this case study from a GP practice.
Choosing an endpoint security solution - keep focused!
When choosing a solution to secure endpoints, don't be distracted by unnecessary features - find out how in this blog
What's the right choice for automating IT processes?
There isn't "one size fits all" solution for IT Process Automation, so how do you make a choice? Find out in this blog
Dirty Pipe Vulnerability (CVE-2022-0847)
Osirium products are not affected by the so-called "Dirty Pipe" vulnerability, here are the details.
The State of UK Cyber Security Attacks in 2022
Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.
How Does Privileged Process Automation (PPA) Work?
Privileged Process Automation (PPA) can be transformative for IT Process Automation, find out how ....
Boosting Cyber Resilience
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Linux PolicyKit vulnerability no risk for Osirium PAM
Long-term vulnerability in Linux poses no risk for Osirium PAM
AutoCAD and Local Admin Accounts - reducing risk
Removing the risk of local admin without impacting AutoCAD users
Launch of Osirium's PAM v8.0 - MFA, JIT, and lots more
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
Apache Log4j Vulnerability
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
Passwordless Authentication for PAM with Authlogics
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
MSPs and Ransomware - the weakest link
MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients
Are businesses doing enough to protect against ransomware?
New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...
Record High Costs of Data Breach
The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.
Implementing Zero Trust with Osirium products
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
CyberUK 2021 Highlights
A summary of the recent CyberUK 2021 conference, including protecting the NHS and education sector from ransomware.
Supply Chain Threats And MSPs
Many organizations depend on MSPs and MSSPs. This article discusses why MSP security is critical to protect themselves and their clients.
Ransomware: The threat and blocking lateral movement
Understanding the threat and blocking lateral movement from ransomware
Securing Remote Access with Osirium PAM
Remote access to IT systems for staff and third-parties needs to be approached carefully - see why Privileged Access Management (PAM) is key to working safely
Taking PAM To The Next Level With Automation
Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.
What is Privileged Access Security?
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
Are PAM and IAM the same? Let us explain the difference
Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?
Protecting backups with PAM
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Welcome to 2021 - What's on Your New Year Plan?
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
Don't Be The Next Malware Victim
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
Simple DSP Compliance in the NHS
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
Cloud MFA for PAM with RSA
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
How ready are you for a Cyber Essentials assessment?
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
NCSC Annual Report: The need for Osirium's PAM
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
IAM v PAM - best option for user security?
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
Relieving the headaches of working with virtual machines
Managing VMs is a pain, but Privileged Process Automation can safely automate the common tasks. See how ...
How to know which Domain Controllers need updates
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Why keep doing boring stuff? Get PPA Express free!
Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.
A bad week for universities targeted in cyberattacks
There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?
Patch Tuesday Made Easy - With Privileged Process Automation
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
Adaptive Authorisation vs Adaptive Authentication
Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation
Imagine If DevOps Could Be Easily Automated
A new type of automation is needed for DevOps
Privileged Access Security - A Deeper Dive
Privileged Access Security should be a priority. Osirium CTO, Andy Harris, explains why and lays out the roadmap for a solution.
Imagine If Security Operations Automation Was Easy
Security updates need to be done right first time and automation ensures safe and accurate changes. See how in this blog.
Some Inconvenient Truths About Credentials and Remote Access
In general VPN access is more risky than office based access, and there are some uncomfortable truths about humans and credentials.
Imagine If ... Network Operations Automation Was Easy
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
Imagine If It Was Easy To Provision New Accounts
Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer
Imagine If Business Users Could Get Their Own AWS Data
Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...
Imagine If Recertification Was Easy
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
Introducing PPA Task Builder - Low-code automation
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
PIM, PUM and PAM explained
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
Introducing Osirium PAM v7.0
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Managing Developer's Systems with PEM
Developers need to install and configure Visual Studio and various add-ins to do their work. PEM lets them do their work without needing local admin rights
Secure Remote Privileged Access for Free
Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.
Privileged Endpoint Management – Security vs Users
Getting the balance right between security and user productivity is really hard. With PEM, the balance can be restored so everyone's happy.
Instant Internal Auditing with PAM, SIEM and Slack
For many organisations, Slack has become the central core of communications between processes and people.
What is Privileged Process Automation
If you had the choice, what superpower would you have?
PAM - Fault-Tolerant and Highly-Available
We’re often asked about high availability and fault tolerance for Osirium PAM
Introducing PXM Platform 6.5 – What’s New?
PXM Platform reaches v6.5, see what's new
Controlling AWS Costs with PPA
Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.
Announcing PPA 2.2
We’re very pleased to announce that the latest release, 2.2, is now available
Auditing Privileged Access Management
Where would the investor confidence be without the governance...
Automating Ansible with Osirium PPA
Osirium’s Privileged Process Automation (PPA) tool formerly known as Opus is the perfect complement to Ansible
Five Reasons Why You'll Sleep Better with Osirium's PAM
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Multi-Factor Authentication: Osirium PAM and OneLogin
Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out
Why you need PAM for Process Automation
In this post, we're going to look at some aspects of automating a privileged process
Infosec 2019 – Bigger than ever for Osirium
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
Privileged Access to Web Apps – A Magical Solution
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
Securing Third Party Access
There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks
Secure IT Process Automation – Dream or Reality?
Is it possible to automate IT tasks, improve security and improve customer service?
Privileged Access Management and Essential Services
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Thoughts on Cloud and Cyber Security Expo 2019
Reflections on Cloud and Cyber Security Expo 2019
PAM – The secret to CI and DevOps Success explained
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
The journey through PAM, PTM and onto RPA
Secure automation needs more than just robots, you need privileged process automation.
What is Privileged Robotic Process Automation?
Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)
Privileged Access Management – Common Use Cases
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
Why NHS security needs a new approach to PAM
Osirium’s PAM is specially designed to stop cyber-attackers from hacking NHS operations
Sharing Privileged Accounts With Third Parties
In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.
IoT, Internet of Things is not a good term…
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
What are the different approaches to digital transformation
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
Osirium and RazorSecure Strategic Alliance
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
How to separate your business from cyber-attacks
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.