How to Use Design Thinking for Next-Gen Privileged Access Management Architecture

As cyberattacks speed up and become more complex, defenders need to do the same. One large component of this is privileged access management, or PAM. But PAM itself is always evolving. So how does your security operations center (SOC) keep up? And, what are the best, most modern ways to implement PAM today? What Is […]

The post How to Use Design Thinking for Next-Gen Privileged Access Management Architecture appeared first on Security Intelligence.

Continue reading How to Use Design Thinking for Next-Gen Privileged Access Management Architecture

How to Use Design Thinking for Next-Gen Privileged Access Management Architecture

As cyberattacks speed up and become more complex, defenders need to do the same. One large component of this is privileged access management, or PAM. But PAM itself is always evolving. So how does your security operations center (SOC) keep up? And, what are the best, most modern ways to implement PAM today? What Is […]

The post How to Use Design Thinking for Next-Gen Privileged Access Management Architecture appeared first on Security Intelligence.

Continue reading How to Use Design Thinking for Next-Gen Privileged Access Management Architecture

Security by Design and NIST 800-160, Part 3: Technical Processes

Picking up where we left off on the security-by-design thinking offered by NIST 800-160 Volume 1, we move onward in Chapter 3, focusing on the technical management processes. Let’s look at some security design principles at the technical processes level.  Technical Management Processes Chapter 3.3 shows us eight processes. Like we did in Part 2 […]

The post Security by Design and NIST 800-160, Part 3: Technical Processes appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 3: Technical Processes

How Enterprise Design Thinking Can Improve Data Security Solutions

“Design must reflect the practical and aesthetic in business, but above all … good design must primarily serve people,” said Thomas J. Watson, a man synonymous with IBM. To no one’s surprise, he was a proponent of good enterprise design. Design must serve people. It simply makes sense that a well-designed product can meet the […]

The post How Enterprise Design Thinking Can Improve Data Security Solutions appeared first on Security Intelligence.

Continue reading How Enterprise Design Thinking Can Improve Data Security Solutions

The Journey to Simplicity: User Experience in Security

Keeping an organization secure is no easy task, especially with the explosion in cloud adoption and digital transformation against a backdrop of increasingly dangerous threats and threat actors. We can all recite the challenges that security teams struggle with — too many solutions, not enough people, not enough visibility. With the average organization deploying 25 […]

The post The Journey to Simplicity: User Experience in Security appeared first on Security Intelligence.

Continue reading The Journey to Simplicity: User Experience in Security