compromised credentials
From Stolen Credentials to Full Network Compromise
How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks ...
Trusting Passwords: Best Practices for Threat-Proofing Credentials
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the ...
Response Required
Why organizations need to react urgently to the state of password security, according to data from 451 Research In a recent brief titled “Love ‘em or Hate ‘em, Passwords Are Here to ...
Protecting against business email compromise (BEC) means stopping stolen credentials at source
More than $26bn has been reported lost in business email compromise attacks in the last 4 years , according to the FBI’s IC3, though the true figure is undoubtedly far higher. Business ...
Is Your Corporate Access Data for Sale on the Dark Web?
As businesses turn to remote access solutions to empower workers during the COVID-19 crisis, trouble seems to be brewing across numerous illegal marketplaces and the Dark Web. Cybercriminals are actively shopping for ...
Solving the Compromised Credentials Conundrum
Today is World Password Day and organizations are unfortunately still reliant on archaic password strategies that put the onus on users to create and remember numerous complex and constantly changing password strings ...
Why Common IAM Solutions for Identity-based Attacks Aren’t Really Working?
by Stan Bounev and Chris Olive When faced with the problem of data being open to all users on an early, 1960’s mainframe computer, Fernando “Corby” Corbato rather nonchalantly assigned passwords to ...
Assessing the risk of compromised credentials
Assessing The Risk of Compromised Credentials to The Enterprise Businesses today face an abundance of organizational risk. These come in the form of creating the business model itself, dealing with third parties, ...
Questions To Ask When Considering A Credential Screening Solution
Credential screening providers are critical business partners who help mitigate the risks of cyberattacks and choosing the right one can prevent exposure of additional risks. Depending on how the data is handled, ...
How Machine Learning for Cybersecurity Can Thwart Insider Threats
While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about using machine learning to detect malicious programs, but it’s less common to ...

