© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_4

4. Identity As a Business Function

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

The foundation of cybersecurity defense has been muddied by point solutions, false promises, and “bolt-on” solutions that extend the value of a given technology based on a specific need. After all, if we count how many security solutions we have implemented, all the way from antivirus to firewalls, you typically find dozens of vendors and solutions that have been implemented throughout the organization. The average user or executive is not even aware of most of their ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.