April 18, 2024, 12:27 p.m. | Paul Wagenseil

SC Magazine feed for Strategy www.scmagazine.com

The line between standard and privileged users is blurring as the standard user often has access to sensitive data and can perform high-risk actions as part of their daily activities, making them ripe targets for cyber threats. Here's what to know and what to do.

access actions can cyber cyber threats daily data high iam-technologies identity line making organization privilege privileged privileged access management privileges ripe risk sensitive sensitive data standard threats workforce

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Engineer (Security Operations Centre)

@ People Profilers | Singapore, Singapore, Singapore

DevSecOps Engineer

@ Australian Payments Plus | Sydney, New South Wales, Australia

Senior Cybersecurity Specialist

@ SmartRecruiters Inc | Poland, Poland