Identity and Access: The Game is the Same – It Just Got Fiercer
CyberSecurity Insiders
JUNE 15, 2022
By Gunnar Peterson, CISO, Forter. In fact, Microsoft’s CVP and CISO Bret Arsenault summarized the issue perfectly: “Hackers don’t break in, they log in.”. Access to systems should be monitored not only for policy compliance, but also for known malicious behaviors. It is a frontline perimeter for defenders.
Let's personalize your content