Access Granted

Ep 1: The Cyber Risks of Credential Misuse, Static Access, and Over-Provisioning


Listen Later

This episode features John Morton, Field CTO and Cyber Defense Specialist at Britive.


The conversation focuses on the shift from traditional data center architectures to a cloud-based, distributed architecture, it only makes sense for PAM technologies to do the same. This episode also touches on:

  • The importance of separating authentication from authorization.
  • Understanding security basics and how they apply to identity and access management.
  • Why adopting zero standing privileges is critical to reducing the risk landscape and achieving zero trust.
  • Watch the episode on YouTube

    ...more
    View all episodesView all episodes
    Download on the App Store

    Access GrantedBy Britive