Osirium blog

' . $img_alt . '

Watching The Insider Threat: how the business of hacking can turn your trusted employees into corporate terrorists…

The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence. Digitisation-led, dynamic… Read Post

Privileged Task Management – Busy Work versus Thinking Work

In the world of DevOps there are two types of work, 'busy work' and 'thinking work'. Your staff will be very clear about which they prefer doing.… Read Post

' . $img_alt . '

Notes from the Fraud Tube Spring Event

With all of the formality and tension that can surround the topics of cybersecurity and fraud, it comes as a welcome opportunity to get the chance… Read Post

' . $img_alt . '

World Economic Forum rates Cyber Attack Risk

Recently we've come across this research from the World Economic Forum here. Here we've reworked the data to show both the risks in terms of impact… Read Post

' . $img_alt . '

So why Privileged Access Management (PAM)?

In 2007, a KPMG study found that just 4% of all reported cyber-attacks were caused by malicious insiders, but only three years later, that number… Read Post

' . $img_alt . '

Privileged Access Management delivers the safety net

In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all...… Read Post

' . $img_alt . '

Returning from NITEC

For those not familiar with the event, NITEC is a flagship annual event organized by the NATO Communications and Information Agency and the… Read Post

' . $img_alt . '

Privileged Access Management integrated with SailPoint’s Identity Governance

We've completed our integration with SailPoint's Identity Governance solution. Here's a video to introduce the functions and show the two working… Read Post