Featured

Contributor:
Kris Zentek
August 7th, 2013

Enhanced User Experience in Privilege Guard v3.8

Privilege Guard’s UAC Replacement Extends to MSI Packages

For quite some time we have supported Windows Installer packages, empowering standard users to run MSI’s, MSU’s and MSP’s that would require administrator privileges to complete. This functionality is fundamental in most least privilege deployments, where power users are delegated the privilege of choosing their own productivity tools.

We worked closely with our customers to understand how we can improve this offering, and came up with some additional use cases. We listened, and we delivered a much better user experience in 3.8.

Continue Reading

Boards fall short on cyber security and technological knowledge

In light of the recent data breach at TalkTalk I started to think about why breaches are becoming so common and why there appears to be such a gap between corporate priorities and cyber security. Then something dawned on me, I spend a lot of time speaking with members of the C-suite and articulating the benefits of key security foundations and defense in depth. At lot of the time the members of the C-suite lack the requisite skills to really grasp the importance of cyber security. Through no fault of their own, they do not come from technology backgrounds, but from sales, finance and marketing. In addition, many corporates have not appointed a Chief Security Offer.

Continue Reading


Let the bird fly

Learnings from the keynote at Gartner’s Security & Risk Management Summit, Washington

Every business is becoming a digital business. By 2017, 50% of IT spend will fall outside of the IT department’s control. So what does this mean for organizational security?

The first temptation is to take back control and lock everything down. But that would be the wrong thing to do, and here’s why.

Continue Reading


Will you COPE beyond BYOD?

Since 2010, BYOD (Bring Your Own Device), where employees use their own smartphones, laptops and tablets in the workplace, has revolutionized both how and where we work.

Continue Reading


Five New Year Security Resolutions

Many of us usher in the New Year with a set of aims or ambitions. If you’ve made a vow to get a better grip of IT security in 2015, what can you do to quickly and easily improve your security posture in the year ahead? Here we take a look at the top 5 quick wins.

Continue Reading


Celebrating the North West tech scene

Last Friday, the North West’s tech community converged on Manchester to celebrate the entrepreneurial spirit and technological innovation of the region.

The Insider Business of Digital and Technology Conference, held at the UKFast Campus, saw over 100 business leaders, technology entrepreneurs and digital devotees come together to discuss how technology underpins business success. In addition to this, we also touched on the latest trends in the technology sector and what we, as a region can do to ensure the North West remains a hotbed of technology talent.

Continue Reading