
“We’re encouraging additional security to be put on top of the admin logins,” Bohren says. “In addition to having the user id and password, they also are going to need to have some kind of second factor authentication.”
Listen now! … https://www.lastwatchdog.com/podcast-how-identity-access-management-iam-authenticates-network-connections/

