United States Cybersecurity Magazine

ProcessBolt
From the Fall 2013 Issue

Managing Privileged Access to Systems and Data

Author(s):

Cal Slemp, , Protiviti

There will always be people who need to be granted access to privileged accounts. In fact, many organizations accept that some privileged access accounts cannot be fully controlled. In many cases, default “Root” or “Administrator” type accounts remain active, with passwords that, while complex and complying with corporate policy, are shared across a team of … Read more