Remove Architecture Remove CISO Remove Network Security Remove Password Management
article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. In many ways, leading a security mission out of a university is like securing a city. Security culture: the security team and everyone else.

article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

Processes enable Identity to power people-centric security. Technology: Technology is the foundation for an IAM program delivery within a layered security architecture. RELATED: Death of the VPN: A Security Eulogy ] VPNs have notably higher operating costs and lower scalability when using device-based architecture.

IoT 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On first-ever Identity Management Day, experts detail steps to a better IAM program

SC Magazine

We had some legacy architecture that that was failing. We really needed to ensure that we were able to support our employee population, and access to critical applications, in a secure manner. Greg McCarthy, CISO of Boston. We had a lot of manual processes, people creating accounts manually,” he explained.

article thumbnail

2024 State of Cybersecurity: Reports of More Threats & Prioritization Issues

eSecurity Planet

Additional security all organizations should consider for a modest investment include: Active directory security : Guards the password storage and management system against attack for Windows, Azure, and other equivalent identity management systems.