On the back of the Microsoft Vulnerabilities Report (2017) findings, Dr. Eric Cole, CEO of Secure Anchor Consulting and SANS Instructor, considers how companies can become more secure simply by removing admin rights from their users, without losing functionality...
In this easy-access piece of insight, Dr. Eric Cole provides some essential tips on the best ways to combat insider threats. He talks on how to raise security awareness in your organization, as well as the benefits of implementing least privilege...
Despite actions taken by businesses to prevent social engineering attacks, social engineers are infiltrating organisations using increasingly sophisticated methods. So how can businesses ensure that relevant employees are aware of the threats and know how to deal with them?
What changes will organizations have to adapt to if they’re to stay secure? What technology should they adopt to achieve this? And how will new regulations (like GDPR) affect the way data is stored and protected?
Courtesy of our Security Analyst James Maude, here are our top five predictions for the year ahead…
This blog covers key questions around the necessary steps in achieving compliance with the latest Defense Federal Acquisition Regulation Supplement (DFARS) and the National Institute of Standards & Technology (NIST) Special Publication 800-171.
A common assumption is that Macs are more secure than Windows PCs, but the discovery made by Developer Lemi Ergan may be causing people to rethink. A flaw in High Sierra (macOS 10.13), allows users to gain admin rights by logging in as 'root'... without a password.
A damning report by the National Audit Office (NAO) has exposed some crucial flaws in the preparation of the NHS against cyber attack, following the WannaCry ransomware outbreak.
With the release of Avecto Defendpoint v5.0 we have not only made implementation faster and easier with our Quick Start policy but also increased the security of our customer's endpoints as well. This security boost comes in the form of Trusted Application Protection (TAP), a new feature designed to neuter the common attack techniques that plague organisations today.
For too long we’ve seen organizations unable to successfully operationalize their security investments because they are difficult to implement or their security products work in isolation. Organizations need to connect the dots for greater contextual insight into the threats they face in order to build a defense strategy based on meaningful, real-time intelligence.
I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.
A few weeks ago, I was having a conversation about how teams successfully scale. One of the approaches I’m a strong proponent of is principles. Principles are a guiding light that describe what’s important to you and crucially, help you make decisions.