1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Fortscale's user behavioral analytics solution provides full context when truly malicious...

Discussion in 'Network World' started by RSS, Jan 14, 2016.

  1. RSS

    RSS New Member Member

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

    One of the weakest links in security systems is end user credentials. They are often abused by their legitimate owners, and stolen by malicious actors. The 2014 Verizon Data Breach Investigations Report revealed that 88% of insider breaches involve abuse of privileges, and 82% of security attacks involve stolen user credentials.

    An external attacker might use a stolen set of credentials to make the initial infiltration of a network, to make lateral movements inside the network to gain access to sensitive data or information, or to exfiltrate data to complete the breach. This type of activity is hard to detect because the credentials themselves are legitimate—they are just being used the wrong way.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page