Everett, 2011
Identity and Access Management: the second wave
Type
Article
Year
2011
Authors
Everett, C.
Identifiers
Publication
Computer Fraud & Security, Volume 2011, Issue 5
Pages
11-13
Abstract
Many regulated organisations are now starting to activate a second wave of
Identity and Access Management (IAM) initiatives as they attempt to rectify the
mistakes made in the first attempt.
Links
Citation
Everett, C., 2011. Identity and Access Management: the second wave. Computer Fraud & Security 2011, 11–13. https://doi.org/10.1016/S1361-3723(11)70051-3
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.