Similar Posts
6 tips for better collaboration between security and cloud teams
ByKayne
Kayne McGladrey, CISSP and cybersecurity strategist at Ascent Solutions, advocates tight management over account privileges. It gives a granular view into your cloud team user accounts and privileges. It’s important that both teams understand and accept the need for controlling access up front.
Report: CISO Strategies & Tactics For Incident Response
ByKayne
“Your incident response plan will be examined during discovery, period, point blank. Keep that in mind. It’s your policy and your plan that are going to be examined by our discovery, and make sure that you can actually do what that policy says and make sure you can do what the procedures say.”
How An Identity and Access Management Program Saved a Retailer $100k+ In Fraud Annually
ByKayne
Gartner estimates that 63% of all IAM products will be thrown out in the next two years as the ‘requirements have changed’ since the date of original purchase. The challenge for new and existing IAM programs is to establish and maintain a strong justification for the program’s continued existence. One retail client recognized this potential risk to their IAM program and took a novel approach to clearly illustrating the benefits of an IAM program.
IT’s New Normal
ByKayne
“On a related note, #ZeroTrust isn’t a sticker on your router or a #cybersecurity product that you buy. It’s a shift in architectural patterns that have to be supported by policies.”
Solving the Challenge of Multi-Factor Authentication Adoption
ByKayne
I was interviewed by Network World for this piece on MFA.
4 Ways Private/Hybrid Clouds Improve Business Outcomes
ByKayne
CIO Online interviewed me for this article about authentication and authorization for hybrid and private clouds.