Reducing the blast radius of credential theft

This article has been indexed from

Help Net Security

Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data and systems. Verizon’s latest data breach report found that credentials are the most sought-after form of data. As we have repeatedly seen, a single set of compromised credentials can be enough to infiltrate an organization and drop a virtual bomb in its network. The Colonial Pipeline ransomware … More

The post Reducing the blast radius of credential theft appeared first on Help Net Security.

Read the original article: