Closing the Identity Threat Detection Gap: The Okta Support Unit Breach Revisited
Revisit what happened at Okta, what the impacts were to both Okta and its customers, and how a more sophisticated approach to identity threat detection may have led to a very different outcome.
Five Lessons from the Microsoft Identity Breach
Notable new developments from Microsoft’s identity breach and five lessons security teams can take from it.
Why Microsoft’s Latest Breach is an Identity Threat Detection Wake-Up Call
Let’s take a closer look at what happened, why it matters, and what lessons the industry can apply in an effort to defend against identity-based threats more effectively.
Enhancing Cybersecurity in Hyper-Regulated Industries: A Data-Driven Approach
Nicola Sotira, Head of CERT at Poste Italiane, Italy’s largest postal service provider, shares how he built his CERT Big Data Analytics to analyze millions of new logs daily
Cyber Observations from a CISO Village Elder
“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.”
Insider Risk – Where do Enterprises Stand and Where are They Going?
“Identity is about establishing trust, while insider risk is what happens when the trust chain is broken. That trust chain might be someone to whom you have willingly given credentials or a trusted employee who has shared credentials or, worse, an impersonator who has stolen credentials.”