IDG Contributor Network: 5 steps to simple role-based access control

Despite all of the advanced attack scenarios we face in the world of cybersecurity today, it seems like we continue to shoot ourselves in the proverbial feet with the simple things.

Case in point — a study released this week by the Cloud Security Alliance indicating that almost a quarter of breaches reported by companies surveyed involved compromised credentials. Even more astounding was the fact 65% of the respondents indicated that their likelihood of a future breach due to stolen login information was medium or high. We clearly understand that we have a problem, but have little confidence that we can address it well.

To read this article in full or to leave a comment, please click here

Original URL:  

Original article

Comments are closed.

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: