After years observing cybersecurity defenders balance cost and effectiveness, focus has oscillated solely between device (e.g., endpoint) and identity (e.g., directory or identity provider) security.

While other technology and security domains contribute to overall maturity, their contributions are incremental and a distant third by comparison.

Put another way: If you aren’t exceptional at both device and identity security, being exceptional in any or all other areas won’t help.

Discussion: LinkedIn

Categories:

Updated: