Fr. 34.50

IAM and PAM Cybersecurity - Securing Identities and Access Management in the Digitalization Era

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

In today s digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies making it essential for zero-trust security, compliance, and efficiency.
Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.
Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.
Readers will learn:
·        Why securing identities is critical today
·       

Sommario

Chapter 1: IAM, Securing Identities in the Digitalization Era.- Chapter 2: PAM, Protecting Privileged Accounts and Access Management.- Chapter 3: IAM and PAM risks, impacts, and challenges.- Chapter 4: IAM and PAM tools and frameworks.

Info autore

Massimo Nardone has more than 30 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He holds an M.Sc. degree in computing science from the University of Salerno, Italy.
 
Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.
He is currently working as Vice President of OT Security for SSH Communications Security.
He is an Apress co-author of numerous books, including Spring Security 6 Recipes, Secure RESTful APIs, Cybersecurity Threats and Attacks in the Gaming Industry, Pro Spring Security, Beginning EJB in Java EE 8, Pro JPA 2 in Java EE 8 , Pro Android Games, and has reviewed more than 100 titles.

Riassunto

In today’s digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies—making it essential for zero-trust security, compliance, and efficiency.
Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.
Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.
Readers will learn:
·        Why securing identities is critical today
·        Key differences between IAM and PAM
·        Major access management risks and challenges
·        Common IAM and PAM solutions (e.g., Azure AD, Okta, CyberArk, BeyondTrust, SSH Communications Security)

Dettagli sul prodotto

Autori Massimo Nardone
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 02.03.2026
 
EAN 9798868820182
ISBN 9798868820182
Pagine 137
Dimensioni 155 mm x 8 mm x 235 mm
Peso 236 g
Illustrazioni IX, 137 p. 16 illus.
Serie Apress Pocket Guides
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Netzwerksicherheit, Security, Privacy, Identity, Cybersecurity, Data and Information Security, Mobile and Network Security, Security Services, Identity and access management, IAM, Pam, priviliged access management

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.