Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

  • 3h 10m
  • Darran Rolls, Morey J. Haber
  • Apress
  • 2020
Detailing the risks associated with poor identity management practices, this book outlines the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises.