cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...

FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

cso_online

Identity as an attack surface

Instead of targeting networks and applications, more and more bad actors are exploiting identities Thanks to mobile computing, cloud apps and tele-working, the de-perimeterization of ...