FEATURE
As the compromise and misuse of identity
is often at the core of modern threats,
privilege accounts are a prime target
for phishing and social campaigns.
Peter Draper, Technical Director EMEA,
Gurucul, discusses how Privileged Access
Management monitoring enables companies
to mitigate against insider threats.
The compromise
and misuse of
privileged identity
48 Issue 24 |
www.intelligentciso.com