Securing the Network
Identity and Access Management: The Quiet Disruption in Security Engineering
Author(s):
Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine
We are on the cusp of a revolution in information security engineering. Even a cursory glance at the security technoscape shows a shift away from perimeter-based defenses and their electronic ramparts, bastions, and moats, toward mechanisms that automatically regulate access to data resources and processing functionality in real time. This is consistent with and reflective … Read more