8 Identity & Access Metrics To Manage Breach Risks
Measurables for improving security posture around access controls.
Ericka Chickowski, Contributing Writer
April 2, 2015
9 Slides
Already have an account?
Another piece of low-hanging fruit, this is a good way to tell if organizations are again leaving the proverbial door wide open.
"This will inform you of all the various attack vectors that an intruder can try to leverage to gain unauthorized access," says Dustin Melancon, senior network engineer for Venyu. "After you are aware of all possible attack vectors, you can begin closing all unnecessary TCP/UDP ports and in effect minimizing your exposed attack surface."
About the Author
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
You May Also Like
More Insights