This blog parses through key findings of recent research around identity-based threat vectors and cybersecurity controls. It also assesses the impact of recent trends (remote work, BYOD, shadow IT), such as in response to COVID-19.

By admin