February 26th, 2010
As a new software release for least privilege leaves the building, it seemed an opportune time to start blogging, not to plug the release of course, click here. Alright, I’m allowed one shameless plug in my first blog given the team have worked so hard on this release. But seriously, I’m hoping that my blog will become a balance between sharing my experience in the system management space, with a bias towards least privilege, and providing valuable insights into the Privilege Guard (Edit: now Defendpoint) product.
- April 18th, 2017
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.
- April 12th, 2017
The Dridex banking Trojan, once one of the most active and prolific malware strains, went quiet back in the summer of 2016. The large-scale spam operations distributing it dried up and the few samples that still appeared showed no significant changes. This appears to have represented a period where the attackers were retooling as Dridex has returned with fury and a spam campaign spearheaded by malicious Word documents exploiting a zero day vulnerability in Microsoft Office.
- March 29th, 2017
Sandra Salame, Operations Manager at Crestan, talks about the benefits of a partnership with Avecto and discusses our successful Middle East roadshow featuring award-winning speaker and Microsoft MVP Sami Laiho.
- March 24th, 2017
One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.
- January 27th, 2017
A new year brings with it a new set of security challenges. From the escalation of ransomware and social engineering to the Internet of Things and the continued security headache that presents. Keeping pace with these challenges and staying one step ahead of cyber crime will be critical for security vendors but it also has a significant knock-on effect for the channel.