Many attacks that begin outside an organization follow a familiar methodology: Attacker compromises a network device to gain a foothold within an organization, then uses the victim’s access privileges to move throughout the IT environment and gain access business-critical file shares, databases and application servers housing sensitive data and intellectual property. This white paper from BeyondTrust lists the Top 20 Critical Security Controls to combat abuse of privileged access.
Phil Muncaster reports on China and beyond
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech