SC Mag: Congressional Report Faults OPM Over Breach Preparedness and Response

Today, Sirota added, companies treat physical objects, like laptops and phones, as hard assets they both protect – through physical security, login management – but also through asset management, so they detect loss or misuse. Digital assets need to be managed like physical assets, he told SC. “That’s true for IP and especially true for identity data belonging to customers or employees. By rethinking protection around the data, organizations will have better visibility and control over how the asset gets accessed and used.”