Remove 2002 Remove Compliance Remove Firewall Remove Security
article thumbnail

What Is cloud security?

Lacework

At this time, establishing server securing meant focusing on physical measures and preventing unauthorized individuals from accessing the hardware. The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online.

Cloud 98
article thumbnail

When least privilege is the most important thing

CIO

In the ever-evolving realm of information security, the principle of Least Privilege stands out as the cornerstone of safeguarding sensitive data. However, this fundamental concept, emphasizing limited access to resources and information, has been progressively overlooked, placing our digital ecosystems at greater risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

article thumbnail

Managing Access Requests and Segregation of Duties Compliance

Saviynt

Using the built-in dashboards to monitor compliance with internal controls becomes overwhelming as users request access to additional resources. What is Segregation of Duties (SOD) compliance risk? In the early 2000s, a series of corporate scandals led to the United States Congress passing the Sarbanes-Oxley Act of 2002 (SOX).