How PAM Tackles Accelerated Change in the Threat Landscape
The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow?
We do so by addressing the fundamentals of attack that don’t change: Attackers use deception, steal identities and escalate privileges until they reach their target – and we evolve our defenses in line with the changed context.
“We can’t secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk.
In this interview with Information Security Media Group, Higgins also discusses:
- How to address the main challenges faced by defenders today;
- What our strategy needs to be in order to cope with tomorrow’s unknown threats;
- How ID has played a key role in security and will continue to do so.