Blog | G5 Cyber Security

Privileged Attack Vectors: Key Defenses

BeyondTrust’s Karl Lankford on Mitigating the Unmanaged Privilege Threat. All insider access to systems must be “managed, monitored and audited” while also ensuring “the principle of least privilege to only give people the access they need at the time they need it,” he says. In a video interview at the recent Infosecurity Europe conference, Lankford discusses the top privileged access management challenges and best practices for assessing, prioritizing and addressing internal and external privileged risks;Key steps for mitigating the threat posed by unmanaged privileges.”]

Source: https://www.cuinfosecurity.com/privileged-attack-vectors-key-defenses-a-12678

Exit mobile version