8 Identity & Access Metrics To Manage Breach Risks Measurables for improving security posture around access controls.
1 of 9
As 2015 stacks up to be yet another banner year for breaches and attacks against enterprises, one of the most common factors to devastating compromises is the attacker's ability to move laterally through network resources and find ways to escalate privileges or abuse existing access.
Whether it is an insider who takes advantage of an overprivileged account, or a hacker who uses an open port to moves through the network until he or she finds a superuser account using default passwords, many of today's security problems eventually come down to poor access and authentication processes and configurations. Dark Reading recently caught up with a number of security experts about the best metrics for keeping access control in check. Here's what they say.
Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. View Full Bio
1 of 9