This report is both disturbing and predictable. Proper credentials management is almost like the unicorn of IT security. Some people believe it actually exists, but rarely do you actually see it outside of books and magazines and sales presentations. For the record, it does exist. It can be accomplished. But it takes time and discipline and the resources to both make it happen and enforce the rules when it doesn’t.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page
Comentarios