Data protection requires effectively coordinating good practices across many security domains. It is actually a large subset of the overall security program. Take a look:
If you’re familiar with Security Architects Partners, you’ll know we’re both broad and deep in… Continue reading
Cyber-Resilience and privileged access management (PAM) will be front and center April 26, 2016 at ISACA’s Central Arkansas Chapter with a full-day seminar from Dan Beckett, one of our Managing Partners.
Cyber-Resilience in the… Continue reading
Last week we delivered our Privileged Access Management (PAM) webinar. In this presentation we noted that because over-privileged accounts are rampant in the IT environment, PAM is a technology that most organizations should consider in the effort to prevent a… Continue reading