The Gig Economy: A New Battleground for Cybersecurity | Cybersecurity Leadership | Scoop.it

Any solution for third party privileged access must provide basic security best practices that mirror established policies for internal employees.