Identity Attack Life Cycle Management
A comment on before, during and after an identity related attack
ITDR, ISPM (and more latterly NHI with some combination of both just for workloads, agentic-AI and other) along with a raft of “identity security” talk (there’s a great book on that topic ;-) over the past 3 years has amplified the fact that our identity infrastructure, assets and capabilities are under attack.
I wont expand on how and why that is happe…
Keep reading with a 7-day free trial
Subscribe to The Cyber Hut Radar - Industry Intelligence Service to keep reading this post and get 7 days of free access to the full post archives.