Category: ICAM
Exploring a Modern ICAM Solution with ZTA Principles

Exploring a Modern ICAM Solution with ZTA Principles

Malicious actors gained access to information pertaining to high profile targets for at least 8 months or longer. Not just affecting the U.S. government, the attack reached hundreds of organizations including universities, governments in Europe, and large private sector companies like Microsoft and Equifax.