Categories : Cloud Security, Data Security, Privileged User            2Comments            Tags: , ,

In my last post I outlined the difficulty organizations are having in preventing insider threats, despite increased incidents and awareness. Much of this stems from the nature of the “privileged user,” which changes as organizations grow, requiring additional access at a time when their own corporate networks grow increasingly complex. Right now CISOs are spending up to 80% of their security budget on perimeter defenses such as anti-virus software, firewalls and limiting outside connections to the network. The problem is […]