Thanks to mobile computing, cloud apps and tele-working, the de-perimeterization of IT security is a “fait accompli”. This has created new challenges for CSOs and new opportunities for attackers. One of the leading threats emerging from the post-perimeter IT landscape involves using Identity as an attack vector. Here’s why.
Historically, information security professionals have focused on mitigating vulnerabilities across traditional attack vectors, namely networks, software or physical plants within their computing environments. Despite the large investments made in preventive and detective security technologies, protecting these traditional attack surfaces continues to be a challenge. As Ponemon states in their 2014 report on Mega Breaches, many companies have failed to prevent breaches with the technology they currently have, where 65% responded that attacks evaded existing preventive security controls.
To read this article in full or to leave a comment, please click here
Original enclosures: |
No comments:
Post a Comment