Privileged Access Management: Break the Kill Chain

Published: Jan. 25, 2017, 5 a.m.

b'Targeted breaches are increasing and they share a common thread - a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.'