Author Archives: François Amigorena

Comments Off on Are You Just Waiting for a Compromise?

Are You Just Waiting for a Compromise?

Are You Just Waiting for a Compromise?

The modern IT organization is well aware that compromises (in the form of both external attacks and insider threats) are more an issue of when than if. You’ve put up some defensive security solutions – AV, endpoint protection, email scanning, etc. – all in an effort to minimize the threat potential. But, beyond that, what … Continued

Comments Off on Software for fighting internal and external network threats

Software for fighting internal and external network threats

Software for fighting internal and external network threats

If you missed us at InfoSecurity London, and with over 300 exhibitors and over 13,000 visitors that is perhaps possible…. here’s your chance for you to get to know us. The following is a short interview from Global Security Magazine. Can you introduce to us your business IS Decisions is a global IT security vendor that … Continued

, Comments Off on Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

For almost four decades, Panama’s Mossack Fonseca law firm has specialised in commercial law, trust service and investor advisory, and was known for its discretion to global elites. However, its recent leak of more than 11 million documents – the biggest data leak in history – only reiterates that law firms can never be too … Continued

Comments Off on Growing Access Management Responsibilites for 2016

Growing Access Management Responsibilites for 2016

Growing Access Management Responsibilites for 2016

Access management responsibilites are extending. There are more and more reasons people need access to information to do their jobs. And it’s not just employees. The ‘extended enterprise’ means your supply chain, your partners and even your customers need access, or temporary access, to sensitive information such as company data, financial data, patient data and personal data. … Continued

, Comments Off on How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

, Comments Off on Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued

, , Comments Off on Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued

, Comments Off on Better Understanding the Insider Threat

Better Understanding the Insider Threat

Better Understanding the Insider Threat

The fact is that many, if not most, security breaches involve internal users, and this risk is known as ‘Insider Threat’. Creating a culture of cybersecurity within and for your employees is paramount in helping to safeguard your company against insider threats. The theme of this year’s National Cyber Security Awareness Month (NCSAM) was ‘Our Shared … Continued

, Comments Off on Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently requesting to be able to use their own devices for work, and the practice is … Continued

, , Comments Off on Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, … Continued

Secured By miniOrange