Many attacks that begin outside an organization follow a familiar methodology: Attacker compromises a network device to gain a foothold within an organization, then uses the victim’s access privileges to move throughout the IT environment and gain access business-critical file shares, databases and application servers housing sensitive data and intellectual property. This white paper from BeyondTrust lists the Top 20 Critical Security Controls to combat abuse of privileged access.
Kathryn Cave looks at the big trends in tech
Rupert Goodwins’ unique angle on tech change
Phil Muncaster reports on China and beyond