Die Umfrage unter mehr als 1.000 IT-Sicherheitsexperten offenbart die geschäftlichen Auswirkungen eines Angriffs mithilfe von gestohlenen Administrator-Anmeldedaten, auch unter dem Namen „Pass the Hash“-Angriff bekannt
Customers can now enhance the security posture of their Unix environment by requiring two-factor authentication for Unix access and extending the security and administration of Microsoft Active Directory to additional environments with servers using…
Survey of over 200 federal IT security professionals uncovers a lack of implementation of federal guidance and identity and access management (IAM) basics
All security stakeholders say their agency has room for improvement across focus areas in the…