Beyond the perimeter: Why identity and cyber security are one single story
ATT&CK techniques detected
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
By James Odom, Director of Cyber, and Jim Small, Director of Identity at Hippo Digital For years, identity and cyber security have been treated as separate disciplines, with identity focusing on authentication, onboarding and access and cyber security focusing on networks, monitoring and threat response. That separation made sense when systems had clearer boundaries. […]
The post Beyond the perimeter: Why identity and cyber security are one single story appeared first on IT Security Guru.