Search
  • Lavi Lazarovitz for Cyberark

History & Future of Credentials Theft


The most common attack vector used by malicious actors to infiltrate and compromise organizations is the compromise of privileged credentials. The most significant breaches in the past 15 years are a solid proof for it.

In the presentation below I describe how hackers are using those credentials and what attack vectors they will choose to take in the near future, as organizations adopt cloud computing and DevOps automation tools.

Media coverage of the insights discussed in the History and future of Credentials Theft:

https://www.cyberark.com/threat-research-blog/cyberark-labs-evolution-credential-theft-techniques-will-cyber-security-battleground-2018/

https://www.scmagazineuk.com/the-three-key-trends-compromising-credentials-and-allowing-criminal-access/article/709484/

http://www.sgcybersecurity.com/securityarticle/securityarticle/cyberark-labs-evolution-of-credential-theft-techniques-will-be-the-cyber-security-battleground-of-2018


0 views
This site was designed with the
.com
website builder. Create your website today.
Start Now