Securing access pathways is just as critical as securing user credentials, says Bomgar’s Sam Elliott. Elliott leads a team of product managers responsible for developing strategy and defining, managing and launching new cybersecurity product suites and offerings. Elliott: Why privileged-access controls still seem so daunting to so many companies. The six steps of securing access can be explained in a video interview at the Information Security Media Group’s recent Healthcare Security Summit in New York, New York. For more information, visit iReport.com/securesecure.com.”]
Source: https://www.cuinfosecurity.com/securing-access-for-privileged-insiders-vendors-a-10505

