BeyondTrust CTO Shares Three Fundamental Steps to Sound… | BeyondTrust
Fresh off the release of his book, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, BeyondTrust CTO, Morey Haber, was among the BeyondTrust execs who came down to Phuket for the inaugural BeyondTrust Partner Conference last week. It was definitely an honour and a privilege for us to be afforded the opportunity to meet and interview Haber, who’s also a guest blogger for our sister publication, CSA, to get his perspective on how cyber threats have evolved over the years and where privileged access management fits into the cyber security picture.