Subscribe via email

Enter your email address for a daily tech summary via email:

Delivered by FeedBurner

Tuesday, April 28, 2015

IDG Contributor Network: Identity as an attack surface

IDG Contributor Network: Identity as an attack surface:

Thanks to mobile computing, cloud apps and tele-working, the de-perimeterization of IT security is a “fait accompli”.  This has created new challenges for CSOs and new opportunities for attackers.  One of the leading threats emerging from the post-perimeter IT landscape involves using Identity as an attack vector.  Here’s why.

Historically, information security professionals have focused on mitigating vulnerabilities across traditional attack vectors, namely networks, software or physical plants within their computing environments. Despite the large investments made in preventive and detective security technologies, protecting these traditional attack surfaces continues to be a challenge.  As Ponemon states in their 2014 report on Mega Breaches, many companies have failed to prevent breaches with the technology they currently have, where 65% responded that attacks evaded existing preventive security controls.

To read this article in full or to leave a comment, please click here

Original enclosures:


No comments:

Post a Comment