5 Tips for Deploying Cloud PAM
Privileged account management for the cloud (cloud PAM) is at long last becoming easier to deploy. To see why, check out my September 17 webinar for BeyondTrust – The Expanding Universe of Privileges: Why Cloud PAM Matters. Therein,… Continue reading
Cleaning up Risk and Technical Debt in the Wake of the Pandemic
IT staff and developers have had to rework many business processes and applications to operate entirely online, and built up a lot of technical debt in the process. Sooner or later, they’ll need to re-architect and re-factor to reduce the… Continue reading
How to Build Security and Risk Management into Agile Environments
Agile security and risk management are possible. This post is the third of three covering agile security challenges, opportunities, and good practices. It also discusses the taxonomy and instrumentation required to operationalize an agile risk management framework down to the… Continue reading
Is Agile Security an Oxymoron?
Agile security has emerged as a core topic for us in two cutting edge consulting engagements over the past few months.
The first of these engagements is to help a very large client develop and mature an enterprise risk management… Continue reading