Reducing the blast radius of credential theft
By Tony Cole, CTO, Attivo Networks Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data and systems. Verizon’s latest data breach report found that credentials are the most sought-after form of data. As we have repeatedly seen, a single set …