Try our new research platform with insights from 80,000+ expert users

Badges

40 Points
2 Years

User Activity

Over 2 years ago
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all…
Over 2 years ago
Zero Trust is the same approach for all users (for example internal and external) - for example, OTP.  The Least Privileged approach defines access rules based on user role. It is common and recommended to combine these two approaches. An attacker has to first break user…
Over 2 years ago
Identity and access management in the cloud - there are more interpretations of this question - like where are the identities stored (on-premise/in cloud/ both with sync between them already)?  where is the service with managed access located? what is the access based on…
Almost 3 years ago