Malicious users, both internal and external, predictably follow a logical series of steps in order to successfully carry out their attacks – also known as the “kill chain”. Privileged access management provides the means to thwart attackers at multiple steps in the attack lifecycle. This paper examines a simple version of a kill chain and provides concrete examples of how privileged access management can help stop attacks and protect organizations from breaches.
Phil Muncaster reports on China and beyond
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech