A recent Forbes article states – “The bottom line is that investing in securing perimeters leaves the most popular attack vector of all unprotected, which are privileged credentials.” We could not agree more.Some of the solutions proposed in the article, however, do not prevent privileged credential attacks – they just detect attacks, maybe, once they have occurred.
About Ian Curry
This author has yet to write their bio.Meanwhile lets just say that we are proud Ian Curry contributed a whooping 2 entries.
Entries by Ian Curry
Numerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla. LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create and send new emails, as […]
- Protect Your Data from Privileged Credential Attacks – Detecting Attacks is Too Late!July 5, 2019 - 11:05 am
- LightNeuron malware – Cord3’s Solution!May 15, 2019 - 2:44 pm
- The Cloud & Privileged Credential AbuseFebruary 28, 2019 - 4:23 pm
- Cord3 to Exhibit at RSA Conference 2019February 28, 2019 - 2:34 pm
900 Morrison Drive Suite 206
+1 343 488 8720