Topic: Cyber protection
More than configuration: Cloud security requires operational preparedness
A successful cyberattack can target cloud services, assets, and actions you can take to build cyber resilience when moving to the cloud. Accenture explains how.
Multi-cloud in healthcare? Think security
Multi-cloud is a necessity to smooth out the process, organizations should consider cybersecurity from the beginning. Accenture talks more about it.
IAM is at the heart of future-proof secure cloud
What is at the heart of a future-proof secure cloud; Accenture talks about the approaches of Identity and Access Management in cloud security. Read more.
Success Factors of Endpoint Privilege Management
How do we enable users to efficiently & securely perform while preventing business disruption? Accenture describes Endpoint Privilege Management can help here.
Differentiate with Customer Identity and Access Management
Customer Identity and Access Management can help your customers gain more control over their data while improving their experience. Accenture describes more.
Identity projects for zero trust roadmaps
Many of the key ingredients needed to implement zero-trust security roadmaps are already at your disposal. Accenture explores more.
The importance of IAM in OT cybersecurity
Organizations in the energy industry can effectively implement IAM and increase resilience against future attacks. Accenture discusses how.
Six keys to successful access authorization
Accenture describes the six keys to successful access authorization as it is a critical capability that all organizations should implement. Read more.
Do’s and Don’ts of Privileged Access Management
Accenture's Ruben Viegas talks about the Do’s and Don’ts of Privileged Access Management based on his experience across multiple industries. Read more.
RBAC, you're about to get even better
Accenture discusses how to make traditional role-based access control better, stronger with AI and machine learning. Read more.
Success Factors of Privileged Access Management
Accenture describes what are the common characteristics of a successful Privileged Access Management program. Read more.
IAM is ready to drive the business—and revenue
Accenture discusses how Identity and Access Management (IAM) is ready to drive the business and revenue if digital transformation is in your roadmap. Read more.
What is zero trust security?
Zero trust security means starting from No. Accenture talks about what we’ve learned and how to get started on your zero trust journey.
Passwordless: the juice is well worth the squeeze
Accenture explains how to accelerate passwordless implementation to work in operational technology to improve security and safe experience. Read more.
Concerned about security in the cloud? Focus on identity management
With some prudent actions, digital identity can enable an organization’s secure journey to the cloud and beyond. Accenture explains how.
Digital Identity: The what, why and how
Many security breaches occur because of issues in digital identity processes, tools and reach. Read Accenture's tips on how to get digital identity right.
There's no reason to risk flying blind in the cloud
Accenture's Mark Rauchwarter talks about Cloud Security Posture Management (CSPM), a comprehensive and automated approach to multi-cloud environment. Read more.
Shifting left in security? The numbers are convincing
Accenture discusses how shift-left security can help organizations keep workloads secure in the age of cloud-based applications and infrastructures. Read more.
collapsed press enter or space to expand
expanded press enter or space to collapse
Subscribe to Security Blog Subscribe to Security Blog