Harold Teasdale

Phishing attack

Phishing attack prevention and self-defense for SMBs: minimize access risk!

Phishing attacks are the most common cause for data theft, so the goal of this article is to teach you some self-defense strategies. Just like in martial arts, the key to self-defense relies on two factors:  know the enemy: raise cyber security awareness in your company know yourself: identify access risk in your company and

Phishing attack prevention and self-defense for SMBs: minimize access risk! Read More »

Welcome on board!

We are pleased to announce that Harold Teasdale, co-founder and partner of XS Matrix joins the executive management team as Chief Executive Director. Harold has been in the IT Security industry for over 20 years, from which he spent 12 at Symantec, the world’s leading IT security software manufacturing company.  Graduated as MSc in Economy

Welcome on board! Read More »

ECSO CYBERSECURITY MARKET RADAR

We are proud to announce that XS MATRIX is listed in the latest 2020 release of ECSO CYBERSECURITY MARKET RADAR which collects significant vendors on the European cybersecurity market and deployment-ready cybersecurity solutions. With more than 100 European cybersecurity companies the 3rd ECSO Cybersecurity Market Radar release presents rich European cybersecurity industry landscape.  Our solutions

ECSO CYBERSECURITY MARKET RADAR Read More »

The most feared topic an auditor can ask! 3/10

Continuous growth of unnecessary access rights, called ‘privilege creep’, have both technical and human causes. The technical reason is that in different software products, entitlements can usually be set very finely and in many ways, but in order to manage them easily and efficiently, they aggregate them into different groups. This means that the access objects, belonged to some software functions and

The most feared topic an auditor can ask! 3/10 Read More »

The most feared topic an auditor can ask! 1/10

I’m starting a series of articles that will cover a significant topic: The Principle Of Least Privilege (PoLP). This extremely important topic is rarely mentioned in IT sphere. In my experience, the industry neglects the problem. The failure to comply with this challenging issue multiplies problems in many areas of IT security. My primary goal is to

The most feared topic an auditor can ask! 1/10 Read More »

Scroll to Top