Enabling Appropriate User Access in a "Zero Trust" World
from DarkReading 18 April indexed on 18 April 2018 20:01Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today's perimeter-less enterprise environments - including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.
Read more.