Articles
The answer to vulnerability caused by an expanding universe of privileged users lies in the management of privileged access.
In the connected world, privilege offers a useful back door for hackers intent on compromising systems.
Michael Horn, executive at Namitrust, discusses how on-demand security can benefit organisations.
Organisations must create overarching security strategies tying together technology and security issues, says Michael Horn, GM of AST Security Management.
Articles About Michael Horn (12)
Machine identities are the foundation of the entire cyber security landscape, says Altron Security's Michael Horn.
Over half of South African organisations polled in a study commissioned by CA Technologies, report improved customer retention owing to their IT security practices.
Research by CA Technologies highlights the pivotal role of identity-centric security in digital transformation.