Security threats explained: Internal excessive privilege

13.07.2012

"This gives the team a view of their current security posture and it helps validate their security controls which are in place," says Hue.

Pure Hacking's Miller provided five key steps for organisations to address the issues surrounding excessive internal privileges.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU