- The open-source tools that could disrupt the entire IT incident management market
- I tested Wacom's latest drawing tablet, and its new display upgrade made my iPad look outdated
- The top mobile AI features that Apple and Samsung owners actually use
- Accelerate Your Docker Builds Using AWS CodeBuild and Docker Build Cloud | Docker
- Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
Navigating the identity security landscape
In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats.
“Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been disabled and turned off and maybe even deleted. There are a number that say within a quarter, but, surprisingly, there is a measurable double-digit percentage number of organizations that say ‘we never really delete accounts, because we don’t know what’s going to happen if we do.’ So abandoned accounts, every time you have an abandoned count, that’s not being watched. That means someone else could be doing something to it, and no one will notice.”
Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!