Featured

Contributor:
Paul Kenyon
September 19th, 2012

How to simplify IT security for universities

Recent data breaches at several U.S. universities this year, such as those at Tampa and Nebraska, have signalled IT security as a rising priority for higher education institutions around the globe. Considering that universities must accommodate networks with thousands of computers, and end-users ranging from students, developers, researchers and admin staff, it’s no wonder that universities’ vulnerable IT systems have become recent targets for attack. A major concern is the number of applications that are downloaded onto university computers, many of which become gateways for malware to enter the system.

Continue Reading

Wham, bam thank you PAM

As the Privileged Access Management (PAM) market matures, two distinct approaches have evolved as the primary focus for organizations considering this type of investment. Last year, the trend led Gartner to redefine the classification of the PAM market into two main categories; Privileged account and session management (PASM) and Privileged elevation and delegation management (PEDM). I’ve given a quick description of these areas below:

Continue Reading


The culture shock (Part 2)

In part 1, I discussed the importance of understanding your company’s culture when embarking on a security project as this can be the key to success or failure. In this blog, I’ll take a closer look at the five key areas you should pay particular attention to.

Continue Reading


The culture shock (Part 1)

In this blog post, I want to share some of my experiences on how company culture can kill a security project, especially when removing admin rights.

Continue Reading


Doing the hard work to make it simple

Avecto has an illustrious history of providing enterprises with control at the same time as ensuring user freedom. By enabling organizations around the world to remove admin rights and put in place realistic application whitelisting, we raise the security bar while helping people achieve compliance and reduce operational costs. 

Continue Reading


Collaboration is King

In April we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.

Continue Reading