Changing the Conversation About Privileged Access

Recent research from Forrester finds that 80 percent of breaches involve the exploitation of privileged access. Several high-profile breaches, including those affecting Anthem, Sony and Home Depot, are examples of incidents where a criminal took advantage of privileged credentials to illegally gain access to a corporate system.

Managing privileged access is a much bigger and more complex job today than it was even just a few years ago, says Scott Walker, a Solutions Engineer (EMEA) at Bomgar Corp., who advises security professionals to be mindful of the components that are at play in employee as well as third-party access as the reliance on vendors continues to grow. Read more.