Targeted breaches are increasing and they share a common thread - a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.
The need to secure your Microsoft Active Directory Services and relevant privileged credentials is a top business priority, given the degree of credential hijacking currently taking place. In 2015, over 75 percent of all compromised records from data breaches was traced directly to the loss or theft of a privileged...
The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights in this video interview.
Organizations are careful when granting privileged access to critical systems. But they struggle to govern these privileged identities. Merritt Maxim of CA Technologies shares new strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.