Formulating and managing online identity and access control
A comprehensive collection of articles, videos and more, hand-picked by our editors
Prompted by the intense news coverage surrounding former NSA contractor Edward Snowden and the WikiLeaks website,...
enterprises are as concerned as ever about the threat of insiders leaking sensitive information. Despite that concern, newly released survey results indicate that many organizations lack fundamental controls for limiting and monitoring the activity of privileged users, a key step in mitigating the insider threat.
For its newly released report, "Privileged User Abuse and the Insider Threat," the Ponemon Institute surveyed nearly 700 users with in-depth knowledge of how their respective organizations manage privileged users. Out of those respondents, 88% signaled that they expect the risk stemming from privileged users to stay the same or grow in the coming years.
Brandan Blevins asks:
What steps has your organization taken to monitor and control the activities of privileged users?
1 ResponseJoin the Discussion