EXPERT ADVICE |
Microsoft may bring location-based marketing to Office 365 |
It's still early days for location-based marketing, but recent integrations and acquisitions by Microsoft indicate it has LBM on its roadmap. |
Definition: access governance (AG) |
Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts. |
Privileged user access: Managing and monitoring accounts |
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. |
Information security risk management: Understanding the components |
An enterprise has to know what risks it is facing. Expert Peter Sullivan explains why an information security risk management plan is crucial for cybersecurity readiness. |
The dangers of using security policy templates in the enterprise |
Among other drawbacks, using security policy templates can make compliance audits and breach assessments harder for enterprises. Expert Joseph Granneman explains why they're risky. |
No comments:
Post a Comment