Threat Actors are incredibly clever and define the threat landscape that affects all of us. Increasingly, rather than go head-to-head against hardened cyber infrastructure, they are looking to exploit trusted relationships through which they hope to gain access to targeted assets and resources. "3rd Party Risk" is one example where attackers look to compromise trusted and connected business relationship. Related in some ways, and an even larger threat, are attacks based on compromising the identity of a trusted partner or employee. With a comprised identity, the attackers assume that identify and leverage its trust status to access networks, assets, and resources. In the Global Digital Economy, Identity is the Key to the Kingdom, and needs to be treated as such. The subject of this month's RSA Blog...
| less than a minute read
Identity.... The Keys to the Digital Kingdom
According to the latest report by the Identity Defined Security Alliance (IDSA), a provider of education and resources to help organizations reduce the risk of a breach by combining identity and security strategies, a whopping 84 percent of more than 500 sizable US organizations said they experienced an identity-related breach over roughly the past year. In addition, most of them said these breaches could have been prevented or minimized by implementing identity-focused security outcomes.