Identity Attack Vectors

Strategically Designing and Implementing Identity Security, Second Edition
de

,

Éditeur :

Apress

Paru le : 2024-03-30

Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or ...
Voir tout
Ce livre est accessible aux handicaps Voir les informations d'accessibilité
Ebook téléchargement , DRM LCP 🛈 DRM Adobe 🛈
Compatible lecture en ligne (streaming)
62,40
Ajouter à ma liste d'envies
Téléchargement immédiat
Dès validation de votre commande
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

À propos


Éditeur

Collection
n.c

Parution
2024-03-30

Pages
299 pages

EAN papier
9798868802324

Auteur(s) du livre


Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud-based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.Darran Rolls is CISO and Chief Technology Officer at SailPoint, where he is responsible for directing the company’s technology strategies and security operations, and is co-author of Asset Attack Vectors. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology management solutions for vulnerability, and privileged and remote access. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures for Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook. He has a long history in identity management and security at companies such as Tivoli Systems, IBM, Waveset Technologies, and Sun Microsystems. He has helped design, build, and deliver innovative, ground-breaking technology solutions that have defined and shaped the Identity and Access Management (IAM) industry. He frequently speaks at industry events and to customers about IAM and next-generation enterprise security solutions.

Caractéristiques détaillées - droits

EAN PDF
9798868802331
Prix
62,40 €
Nombre pages copiables
2
Nombre pages imprimables
29
Taille du fichier
7762 Ko
EAN EPUB
9798868802331
Prix
62,40 €
Nombre pages copiables
2
Nombre pages imprimables
29
Taille du fichier
11162 Ko

Suggestions personnalisées