No more typing reviews! Try our Samantha, our new voice AI agent.
LN

Ladislav Nyiri

  • IDM Engineer at a tech services company with 51-200 employees
  • Has 10+ Years Of Experience
Badges
40 Points4 Years
User Activity
Almost 4 years ago
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all…
Almost 4 years ago
Zero Trust is the same approach for all users (for example internal and external) - for example, OTP.  The Least Privileged approach defines access rules based on user role. It is common and recommended to combine these two approaches. An attacker has to first break user…
About 4 years ago
Identity and access management in the cloud - there are more interpretations of this question - like where are the identities stored (on-premise/in cloud/ both with sync between them already)?  where is the service with managed access located? what is the access based on…
Over 4 years ago
Experience