Osirium Blog

Osirium @ Pycon: Ed Reveals the Patterns in our Pit of Success

Here’s Ed Sharp our Engineering Manager holding court about the patterns of development. His session was at PyCon on Thursday 26th October… Read Post

Osirium: When your biggest problems are solved, you look to the next

In one of our recent Technical Stakeholder Meetings, we were musing over the difference between what the Osirium PxM Platform is purchased for… Read Post

So What’s Wrong with Blacklisting Commands?

Blacklisting is one of those feature comparisons that really gets Osiriumites annoyed. It is pointless, you can drive a bus through it, and… Read Post

The Rise and Rise in Cyber Fraud (The Insider Threat)

In the news we’ve seen a lot about the online abuse of consumers, but the increase in B2B fraud is something not enough leaders are talking… Read Post

Cyber Essentials: the basics, and exactly why it is essential to you and your business

Cyber Essentials is a government-backed, industry supported scheme designed to provide businesses with a set of measures…… Read Post

Privileged Access Management delivers the safety net

In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…… Read Post

Notes from the Fraud Tube Spring Event

With all of the formality and tension that can surround the topics of cybersecurity and fraud, it comes as a welcome opportunity to get the chance… Read Post

World Economic Forum Rates Cyber Attack Risk

SIEM solutions can generate a lot of noise, especially when left static, they may be optimised to alert particular types of attack, but as these… Read Post

Privileged Access Management integrated with SailPoint’s Identity Governance

We’ve completed our integration with SailPoint’s Identity Governance solution. Here’s a video to introduce the functions and show… Read Post

Watching The Insider Threat: So Why Privileged Access?

The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence…… Read Post

Privileged Task Management – Busy Work versus Thinking Work

In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about… Read Post

So why Privileged Access Management (PAM)?

Privileged Access Management (PAM) is pivotal to controlling access to devices connected to the infrastructure…… Read Post

Returning from NITEC

For those not familiar with the event, NITEC is a flagship annual event organized by the NATO Communications and Information Agency and the…… Read Post