Blog | G5 Cyber Security

Identity as an attack surface

The de-perimeterization of IT security is a fait accompli thanks to mobile computing, cloud apps and tele-working. This has created new challenges for CSOs and new opportunities for attackers. One of the leading threats emerging from the post-Perimeter IT landscape involves using Identity as an attack vector. Instead of treating identity as a basic access provisioning function, it should be managed and monitored as a critical resource for the organization. To keep watch over the typical flock of identities in an enterprise, need new tools and automation are required.”]

Source: https://www.csoonline.com/article/2911537/identity-as-an-attack-surface.html

Exit mobile version