Privilegded access management

Last updated 20 Sep 18 @ 06:50 |

Dave Adamson reports on security from within and what’s required to take the next great cyber-security step 

In today’s age of technology pervasion, news headlines are rife with stories of data breaches, the actions of opportunistic cyber criminals and the financial implications of poor security hygiene. The threat landscape is constantly getting wider and the ever-increasing amount of data that businesses are tasked with holding means that – theoretically at least – there are more holes in a company’s cyber security net than ever before.
The vast majority of business and IT leaders are well . . .

Want to read more? You must sign up or log in to view it.