Why Defense-in-Depth Is Critical to Cybersecurity Strategy

Since the inception of Cybersecurity twenty-plus years ago, the industry has gone through a plethora of iterations. The Internet was initially designed to be an open environment to  enable information sharing between academics and researchers. When businesses and government agencies joined the network explosion in the late 1990s, the open environment turned into a security […]

Top 6 Cybersecurity & IAM Articles, March 2016

This week’s IAM and cyber security roundup covers security tools, NERC CIP v5, hospital hacks, Identity Management UX, and more. From February 22 to March 8, 2016, here are the five articles that made the cut.   1. Why Your Security Tools Are Exposing You to Added Risks The overall lesson from the last 12 months of […]