1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

All credentials are NOT created equal

Discussion in 'CSO' started by RSS, Jun 7, 2016.

  1. RSS

    RSS New Member Member

    A lot of effort goes into a company’s perimeter security - making sure that the bad guys don’t get into the network. But as we’ve seen, security isn’t 100% perfect 100% of the time - once the bad guys get in (through phishing or malware), it becomes easier for them to move around and go for the good stuff - the root-level credentials for IT admins and other high-value roles.

    In the latest episode of Security Sessions, I spoke with John Worrall from CyberArk about the different types of credentials, how hackers can get around once they’re inside the network, and where strong passwords and multi-factor authentication makes the most sense.

    Among the highlights of the video are the following sections:

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page