It’s a very exciting time at Avecto. Not only are we celebrating our 10-year anniversary this year, but we’re also announcing that Bomgar, a leader in identity and access management solutions, is to acquire the company.
Despite actions taken by businesses to prevent social engineering attacks, social engineers are infiltrating organisations using increasingly sophisticated methods. So how can businesses ensure that relevant employees are aware of the threats and know how to deal with them?
What changes will organizations have to adapt to if they’re to stay secure? What technology should they adopt to achieve this? And how will new regulations (like GDPR) affect the way data is stored and protected?
Courtesy of our Security Analyst James Maude, here are our top five predictions for the year ahead…
This blog covers key questions around the necessary steps in achieving compliance with the latest Defense Federal Acquisition Regulation Supplement (DFARS) and the National Institute of Standards & Technology (NIST) Special Publication 800-171.
A common assumption is that Macs are more secure than Windows PCs, but the discovery made by Developer Lemi Ergan may be causing people to rethink. A flaw in High Sierra (macOS 10.13), allows users to gain admin rights by logging in as 'root'... without a password.
A damning report by the National Audit Office (NAO) has exposed some crucial flaws in the preparation of the NHS against cyber attack, following the WannaCry ransomware outbreak.
With the release of Avecto Defendpoint v5.0 we have not only made implementation faster and easier with our Quick Start policy but also increased the security of our customer's endpoints as well. This security boost comes in the form of Trusted Application Protection (TAP), a new feature designed to neuter the common attack techniques that plague organisations today.
For too long we’ve seen organizations unable to successfully operationalize their security investments because they are difficult to implement or their security products work in isolation. Organizations need to connect the dots for greater contextual insight into the threats they face in order to build a defense strategy based on meaningful, real-time intelligence.
I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.
A few weeks ago, I was having a conversation about how teams successfully scale. One of the approaches I’m a strong proponent of is principles. Principles are a guiding light that describe what’s important to you and crucially, help you make decisions.
There is no exact method laid out before you, you have a ton of work ahead to make this work and even when you do figure it all out; you then need to get people to listen to you; to buy in to your vision and to invest in it to bring it to fruition and make it a true success.