Mihály Tamás

Insider threat illustration

Enhancing Insider Threat Mitigation

Overcoming Challenges for Robust Security Today, organizations face the persistent challenge of mitigating insider threats. These threats can emerge from malicious insiders or inadvertently through compromised user accounts. To effectively address this risk, organizations must understand the threats, navigate the challenges associated with periodic access reviews, implement robust security measures, and comprehend the consequences of […]

Enhancing Insider Threat Mitigation Read More »

Understanding Periodic Access Reviews

Periodic access reviews are a fundamental aspect of maintaining robust cybersecurity practices within organizations. These reviews involve the systematic evaluation and verification of user access rights to critical systems, applications, and data. By conducting these reviews at regular intervals, organizations can ensure regulatory compliance, mitigate access-related risks, and safeguard sensitive information. In this blog post,

Understanding Periodic Access Reviews Read More »

Cyber resilience

Cyber resilience: Secure the future of your business

As Salesforce’s Chief Trust Officer, Jim Alkove put it in the World Economic Forum:  “Cyber resilience starts with nailing the cyber security basics. At Salesforce, we call it ´doing the common uncommonly well.´… Business resources are often still allocated to defensive cyber security, which is focused on protecting the confidentiality and integrity of data. But

Cyber resilience: Secure the future of your business Read More »

The least privilege principle in practice: 7+1 steps to avoid privilege creep

Imagine you’re standing in line at the checkout in a clothing store. Suddenly, the customer in front of you takes his unpaid goods, walks behind the cash register, opens it and processes his purchase himself. What did he just do? He gained access to an unauthorized area, violating several rules and regulations. Moreover, he could

The least privilege principle in practice: 7+1 steps to avoid privilege creep Read More »

Scroll to Top