Osirium blog

Watching The Insider Threat: how the business of hacking can turn your trusted employees into corporate terrorists…

The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence. Digitisation-led, dynamic… Read Post

Cyber Essentials: the basics, and exactly why it is essential to you and your business

 … Read Post

Laptop Work-10.jpg

The Rise and Rise in Cyber Fraud (The Insider Threat)

Cyber crime cost UK businesses £1bn last year, but what is the true price? … Read Post

Returning from NITEC

For those not familiar with the event, NITEC is a flagship annual event organized by the NATO Communications and Information Agency and the… Read Post

So why Privileged Access Management (PAM)?

In 2007, a KPMG study found that just 4% of all reported cyber-attacks were caused by malicious insiders, but only three years later, that number… Read Post

Notes from the Fraud Tube Spring Event

With all of the formality and tension that can surround the topics of cybersecurity and fraud, it comes as a welcome opportunity to get the chance… Read Post

Privileged Task Management – Busy Work versus Thinking Work

In the world of DevOps there are two types of work, 'busy work' and 'thinking work'. Your staff will be very clear about which they prefer doing.… Read Post

World Economic Forum Rates Cyber Attack Risk

Recently we've come across this research from the World Economic Forum here. Here we've reworked the data to show both the risks in terms of impact… Read Post

blog-(pam delivers the safety net).jpeg

Privileged Access Management delivers the safety net

In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all...… Read Post

Privileged Access Management integrated with SailPoint’s Identity Governance

We've completed our integration with SailPoint's Identity Governance solution. Here's a video to introduce the functions and show the two working… Read Post