We regularly hear chief information security officers (CISOs) lament that they have too many tools and solutions that overlap. Although layered security controls are a desirable way of reducing the risk posed to systems and data, if this is done haphazardly it can result in increased user friction and wasted resources. Sometimes this is caused […]