March 6, 2024, 6 a.m. | Morgan Wright

SC Magazine feed for Threats www.scmagazine.com

While the tools are different, protecting identities has been around for generations. So why haven't we learned how to leverage identity to establish a perimeter?

cyberspace identities identity nothing perimeter protecting tools

Senior Security Researcher

@ Microsoft | Redmond, Washington, United States

Sr. Cyber Risk Analyst

@ American Heart Association | Dallas, TX, United States

Cybersecurity Engineer 2/3

@ Scaled Composites, LLC | Mojave, CA, US

Information Security Operations Manager

@ DP World | Charlotte, NC, United States

Sr Cyber Security Engineer I

@ Staples | Framingham, MA, United States

Security Engineer - Heartland (Remote)

@ GuidePoint Security LLC | Remote in the US