Better visibility into privileged accounts may have stopped last summer’s Twitter breach. Today’s columnist, David Higgins of CyberArk, offers some insight on how breaches are caused when security teams overlook privileged accounts. (Credit: CC BY-NC-SA 2.0)

Historically, privileged access management has focused on protecting  systems administrators and the powerful accounts used to manage critical infrastructure. Today, with the expanding adoption of cloud, DevOps, robotic process automation (RPA) and IoT – more privileged users, accounts and credentials are created every day.  

Instead of only IT admins handling privileged access on network servers, the need for privileged access has expanded to departments such as HR, marketing and finance that need access to sensitive business systems and collaboration tools such as SAP, Salesforce, Workday or Slack. In addition, as digital transformation initiatives have accelerated, the number of privileged credentials associated with not only humans, but also applications and machines, has grown exponentially.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.