How To Reduce Breach Detection Times

June 30th, 2017|Data Protection|

The Invisible Enemy? By Peter Boyle, CTO, Burning Tree Two weeks before WannaCry crippled the NHS, halted car production in Japan, and disrupted rail systems in Germany; IDT had been attacked with a degree of sophistication not seen before. Golan Ben-Oni, Global CIO for IDT – recently featured in a very thought-provoking article in the [...]

What happens to IAM when it’s all in the cloud?

April 3rd, 2017|Cloud, Identity Access Management|

In our experience, Identity and Access Management (IAM) is often an afterthought when organisations migrate to the cloud. 99.9% of our customers will have already got something in the cloud before they realise that IAM needs to be part of their digital strategy. Moreover, many businesses are buying into cloud services without consulting their IT [...]

Jackson Shaw of One Identity talks Digital Transformation with Peter Boyle

March 31st, 2017|Digital Transformation|

Burning Tree were at the Gartner IAM Show on 6 March, meeting with information security professionals and keeping abreast of innovation in the sector. Peter Boyle, Burning Tree’s CTO caught up with Jackson Shaw - Senior Director, Product Management at One Identity – to talk about his vision and the key challenges customers face with [...]

Creating digital identity strategies to enable digital transformation

March 6th, 2017|Digital Transformation|

Over the last few years there has been growing acceptance of the need for digital transformation. Yet, the term digital transformation covers many different ideas and technologies dependent on your perspective. From the adoption of digital photography, printing and camera technology that saw the traditional film and camera businesses drop by the wayside, to the [...]

RSA Conference USA 2017: 3 Reasons To Attend

January 18th, 2017|Conference|

Next month is the annual RSA Conference in San Francisco. Like many UK and European based organisations, we attend the RSA Conference event (#RSAC) every year. The RSA show is of huge value to us, we get to catch up with old friends, make new contacts, uncover new opportunities and tap into the latest technology [...]

How to Automate Governance, Risk and Compliance (GRC) to Reduce Costs

December 13th, 2016|Data Protection|

IT Governance, Risk Management discipline, Information Security Policy and legal compliance requirements all place a burden on companies to ensure their governance, risk and compliance (GRC) policies protect customers, staff and stakeholders. Reducing risks whilst keeping costs low is becoming a key challenge for businesses, especially when the number of cyber-attacks keeps rising. Small businesses, [...]

Core Principles Of Building A Secure Network Architecture

November 22nd, 2016|Data Protection|

In many organisations IT projects are designed to address business objectives or as operational solutions without any thought about security. The security ‘solution’ is often bolted on at a late stage of development, or even after launch when security risks are identified. Sometimes security is overlooked entirely, until something goes wrong. This approach results in [...]

Lessons from Snowden: The Unmanaged SSH Key Time Bomb

October 12th, 2016|Data Protection|

Last month Snowden (the movie) was released in the US. While the film has received mixed reviews, the story behind the movie has played out very publicly over the last three years providing a salutary lesson for all charged with organisational security. Whether you approve of Edward Snowden’s actions by exposing the NSA’s surveillance operations [...]

Can Your IT Systems Heal Themselves? Automation and Cyber security

September 22nd, 2016|Data Protection|

The idea of self-healing networks is very attractive to any IT Director who wants to use valuable resources - IT staff and budget - on more strategic activities. Rather than using people to deal with business operational activities such as for detecting and fixing common network issues, let the computers do it for us. [...]

Insider Threats: Who Is The Biggest IT Security Threat In Your Organisation?

August 8th, 2016|Data Protection|

It is an undeniable fact that in today's digital world, we are all pretty much reliant on information technology and the Internet to run our businesses. It is also a fact that it is not 'if' - but 'when' will our IT Infrastructure and Business Applications be under attack? Before you even begin to [...]

burningtree.co.uk