informa
/
Analytics
Slideshow

8 Identity & Access Metrics To Manage Breach Risks

Measurables for improving security posture around access controls.
1/8

As 2015 stacks up to be yet another banner year for breaches and attacks against enterprises, one of the most common factors to devastating compromises is the attacker's ability to move laterally through network resources and find ways to escalate privileges or abuse existing access.

Whether it is an insider who takes advantage of an overprivileged account, or a hacker who uses an open port to moves through the network until he or she finds a superuser account using default passwords, many of today's security problems eventually come down to poor access and authentication processes and configurations. Dark Reading recently caught up with a number of security experts about the best metrics for keeping access control in check. Here's what they say.

 
Next slide
Recommended Reading:
Editors' Choice
Kirsten Powell, Senior Manager for Security & Risk Management at Adobe
Joshua Goldfarb, Director of Product Management at F5