Everett, 2011

Identity and Access Management: the second wave

Type

Article

Year

2011

Authors

Everett, C.

Publication

Computer Fraud & Security, Volume 2011, Issue 5

Pages

11-13

Abstract

Many regulated organisations are now starting to activate a second wave of
Identity and Access Management (IAM) initiatives as they attempt to rectify the
mistakes made in the first attempt.

(Everett, 2011, p. 1)

Links

Citation

Everett, C., 2011. Identity and Access Management: the second wave. Computer Fraud & Security 2011, 11–13. https://doi.org/10.1016/S1361-3723(11)70051-3


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.