A recent study by Forrester Research unveils a direct correlation between data breaches and organizations' IAM immaturity. What needs to change? Corey Williams of Centrify offers strategic advice.
Williams, senior director of products and marketing at Centrify, says there is a stark disconnect between the amount of...
Detailed actions of privileged users are critical in today's business environment of IT outsourcing, off-shoring and supplementing IT staff with contractors. Major regulations require documenting what users actually do with the privileges and rights granted to them and how their actions impact the IT environment....
FISMA addresses security issues in a comprehensive manner, covering everything from identity management to physical building security. This white paper focuses specifically on identity and access management (IAM) issues, using the guidance provided by NIST Special Publication 800-53 recommended Security Controls for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.