Welcome to Bridgeway's Blog - bringing you news, views and opinions on issues that matter to you.
The purpose of this blog is to help you in your job and offer a better understanding of security. If you have any thoughts on the content or you'd like us to cover something then please don't hesitate to tell us.
You spend upwards of eight hours a day doing everything in your power to keep your system secure. So when an individual from within your own organisation is the cause of an information security breach, it can be exceptionally frustrating.Continue reading...
‘I’m increasingly convinced that people are spending their information security budgets in the wrong places’, said our Sales Director Paul O’Sullivan when I spoke with him earlier this week.
We sat down together to discuss the current state of the security marketplace and why it might be time for IT professionals to reconsider where they are spending their budget.
Consider the following: Joe, an engineer, logged into the source code repository at 10pm last night and downloaded 500MB of data. Meanwhile, the new head of the legal team, Sally, has been logging into the network from West London and Dublin—at the same time.
Pete, an analyst, is accessing a critical finance application that he has never used before, and Claire, one of your sysadmins, has been accessing the customer database after normal work hours every evening for the last two weeks.
Earlier this week we wrote about how the emergence of cloud and IoT have shifted security priorities from arbitrary boundaries towards the protection of data.
Whilst traditional perimeter security cannot be ignored, potential threat vectors are proliferating by the day, and it is here that new approaches—such as user and entity behaviour analytics (UEBA)—help keep your information safe.
Can you confidently say who is connecting to your network?
The prevalence of attacks from inside networks demonstrates that perimeter-based security is outdated and insecure. New insider threats now evolve from within the organisation. Network access control has never been more critical.