April 18, 2024, 12:27 p.m. | Paul Wagenseil

SC Magazine feed for Strategy www.scmagazine.com

The line between standard and privileged users is blurring as the standard user often has access to sensitive data and can perform high-risk actions as part of their daily activities, making them ripe targets for cyber threats. Here's what to know and what to do.

access actions can cyber cyber threats daily data high iam-technologies identity line making organization privilege privileged privileged access management privileges ripe risk sensitive sensitive data standard threats workforce

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark