It is more of an internal users involved in fraud activities than outers and was witnessed in a high profile company, Wipro. Its time to wake up and ensure to tighten more security controls in Financial Departments after discovering the activities made by an employee.
check this
Mahendra Krishnapatnam is a cybersecurity expert and technology thought leader with extensive experience in identity and access management (IAM), cloud security, and AI-driven threat mitigation. He actively contributes to research, mentors startups, and serves as a judge for global cybersecurity and technology awards. His work bridges innovation and impact across healthcare, finance, and public sector domains.
Thursday, March 11, 2010
Tuesday, March 9, 2010
5 Keys to a Successful Identity and Access Management Implementation
I have come across a white paper that talks about 5 ways to implement IDM solution successfully.
Here it is, http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11765255.
Here it is, http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11765255.
Subscribe to:
Posts (Atom)