Mobile Search Mobile Menu

By Abhi Yadav

What the Apple-DOJ Case Can Tell You About Your Enterprise Security

The recent public dispute between Apple and the U.S. Department of Justice (DOJ) over the encrypted “San Bernardino“ iPhone has served as a powerful reminder of the challenges every enterprise faces when it comes to identity and data security. No matter what side of the issue you come down on, it’s clear that there’s a […]

By Abhi Yadav

Limit Vendor Risk – Step 3: Ensure Periodic Access Reviews are Performed

In my previous post, I discussed the second of four steps for limiting Vendor Risk. This month we will review Step 3: Ensure Periodic Access Reviews are Performed. To ensure security processes are in place and operating effectively, you must perform periodic access reviews in order to detect inaccuracies in provisioned access. These are “who, […]