Show Summary Details

Security Operations: Identity Profiles and the Foundations of a New Data Architecture

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
Chapter 23: Scale of IAM Threats: Detecting Compromise Re-imagining Security Operations – Historic Challenge Danger of a Myopic Architecture ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.