There will always be people who need to be granted access to privileged accounts. In fact, many organizations accept that some privileged access accounts cannot be fully controlled. In many cases, default “Root” or “Administrator” type accounts remain active, with passwords that, while complex and complying with corporate policy, are shared across a team of IT administrators to enable them to do their jobs efficiently. In small IT functions, it is sometimes possible to contain the problem to a handful of users. In larger IT functions, this shared access to privileged accounts results in a complete lack of accountability . . .
START READING
TABLE OF CONTENTS
United States Cybersecurity Magazine
- Diffusing cyber threats starts with intelligence and people
- Protecting Critical Data and Infrastructure: Testing and Certifying Technology
- Location, A Must for Mobile Security
- Operating with Privacy in the Wild, Wild West of Wireless Technologies
- Look Out Palo Alto – Here Comes Howard County! The New Epicenter within a Federal Contracting Valley…
- 10th Anniversary National Cyber Security Awareness Month
- NSA Announces Four New Schools for Cyber Initiative
- Biography: General Keith B. Alexander, United States Army
- NSA creates partnership with North Carolina State University
- Maryland The Epicenter for Cybersecurity
- Threats and Opportunities Growing in Cybersecurity
- Northrop Grumman Foundation Furthers CyberPatriot Growth With Renewed Three-Year Commitment
- Learn in Your Own Cyber School
- California and Greater Washington D.C. Metro Area… Virginia, Maryland and the District of Columbia – Top Destinations for Cybersecurity Talent
- Michigan Cyber Summit 2013
- Managing Privileged Access to Systems and Data
- A Strategic Approach to Cybersecurity
- Companies are Unprepared to Defend Against Cyber Threats,
- Loyola Blakefield Cyber Security Team Wins World Title!
Leave a Comment