How PAM Tackles Accelerated Change in the Threat Landscape

How PAM Tackles Accelerated Change in the Threat Landscape

The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow?

We do so by addressing the fundamentals of attack that don’t change: Attackers use deception, steal identities and escalate privileges until they reach their target – and we evolve our defenses in line with the changed context.

“We can’t secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk.

In this interview with Information Security Media Group, Higgins also discusses:

  • How to address the main challenges faced by defenders today;
  • What our strategy needs to be in order to cope with tomorrow’s unknown threats;
  • How ID has played a key role in security and will continue to do so.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.