When two corporate IT environments come together, IT administrators come face to face with one of the biggest IT challenges of a successful merger: privileged identity management.
Cyber security insurance will never pay off for the purchaser because it does not replace proper security or internal IT controls.
Ponemon highlights a number of items that are absolutely excellent to focus on as a security program. However, nowhere on their list did they make room for truly preventative measures like securing privileged credentials.
The notion of the CEO being involved in cyber security is essential. Often the implications and remedies to IT security issues cut across every aspect of an organization’s operations.
ata leaks by employees with privileged access to company and customer data is very common. Whether done accidentally or on purpose, these leaks can be damaging to an organization from both a reputation and legal standpoint.
My take is that the Federal Government’s potential entry into the arena of Internet identity management is a disaster in the making with little to no chance of any benefits for its citizens. The assertion that citizen identity verification would provide any protection against the likes of the Zeus attacks or Wikileaks is a red herring if there ever was one.