PAM Books
2 books in this category
Identity Attack Vectors
Morey J. Haber
Identity Attack Vectors
Morey J. Haber, Darran Rolls
4.3
Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.
intermediateIAMCybersecurity
Privileged Attack Vectors
Morey J. Haber
Privileged Attack Vectors
Morey J. Haber
4.2
This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.
intermediatePAMCybersecurity