September 19th, 2012
Recent data breaches at several U.S. universities this year, such as those at Tampa and Nebraska, have signalled IT security as a rising priority for higher education institutions around the globe. Considering that universities must accommodate networks with thousands of computers, and end-users ranging from students, developers, researchers and admin staff, it’s no wonder that universities’ vulnerable IT systems have become recent targets for attack. A major concern is the number of applications that are downloaded onto university computers, many of which become gateways for malware to enter the system.
- June 21st, 2017
As the Privileged Access Management (PAM) market matures, two distinct approaches have evolved as the primary focus for organizations considering this type of investment. Last year, the trend led Gartner to redefine the classification of the PAM market into two main categories; Privileged account and session management (PASM) and Privileged elevation and delegation management (PEDM). I’ve given a quick description of these areas below:
- June 19th, 2017
In part 1, I discussed the importance of understanding your company’s culture when embarking on a security project as this can be the key to success or failure. In this blog, I’ll take a closer look at the five key areas you should pay particular attention to.
- June 13th, 2017
- June 7th, 2017
Avecto has an illustrious history of providing enterprises with control at the same time as ensuring user freedom. By enabling organizations around the world to remove admin rights and put in place realistic application whitelisting, we raise the security bar while helping people achieve compliance and reduce operational costs.
- May 31st, 2017
In April we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.