article thumbnail

When least privilege is the most important thing

CIO

When this no longer became tenable, Microsoft led the way and started its Trustworthy Computing initiative in 2002. Traditional security methods that rely on data center and database-level controls will not work in this new world. Will we rely on AI to secure its own data – and can we trust that it can do that?

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

I guess the moment it really clicked was after I read the book Building Internet Firewalls , by Elizabeth Zwicky and Brent Chapman in 1997. I was on the road consulting as a system integrator at the time, and I was in a data center for a large utility company in New Jersey when I asked about a box that was sitting on the floor.