Privilegded access management
Dave Adamson reports on security from within and what’s required to take the next great cyber-security step
In today’s age of technology pervasion, news headlines are rife with stories of data breaches, the actions of opportunistic cyber criminals and the financial implications of poor security hygiene. The threat landscape is constantly getting wider and the ever-increasing amount of data that businesses are tasked with holding means that – theoretically at least – there are more holes in a company’s cyber security net than ever before.
The vast majority of business and IT leaders are well . . .