- Revisiting Docker Hub Policies: Prioritizing Developer Experience | Docker
- The most critical job skill you need to thrive in the AI revolution
- Kickstart 2025 with the Top Five in Cisco U. Essentials
- Google Announces Quantum-Safe Digital Signatures in Cloud KMS
- Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
Navigating the identity security landscape
.png?height=635&t=1711369518&width=1200)
In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats.
“Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been disabled and turned off and maybe even deleted. There are a number that say within a quarter, but, surprisingly, there is a measurable double-digit percentage number of organizations that say ‘we never really delete accounts, because we don’t know what’s going to happen if we do.’ So abandoned accounts, every time you have an abandoned count, that’s not being watched. That means someone else could be doing something to it, and no one will notice.”
Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!