81% of hacking-related breaches use either stolen and/or weak passwords. The compromise and misuse of identity credentials provides the easiest doorway into an enterprise network, and the quickest path to its most valuable assets. Identity-based risks are at the core of security issues that keep CISOs up at night. The CIO and CISO need to find common security interests so they can collaborate to meet their organizations goals and needs. Here are three best practices for bridging the gap: Embrace CIO-CISO collaboration.”]
Source: https://www.darkreading.com/careers-and-people/why-compromised-identities-are-it-s-fault

