"All it takes is one targeted identity compromise to inflict a devastating attack." writes Erik Gustavson, Co-founder and CPO of SGNL in this latest blog post. Read how organizations can minimize their blast radius, i.e. "the impact an organization could suffer from a security breach": https://lnkd.in/dqyYc7rQ
SGNL’s Post
More Relevant Posts
-
tl;dr: Reducing blast radius is the difference between having your SOC team handle an incident versus your PR, legal, and finance teams...
"All it takes is one targeted identity compromise to inflict a devastating attack." writes Erik Gustavson, Co-founder and CPO of SGNL in this latest blog post. Read how organizations can minimize their blast radius, i.e. "the impact an organization could suffer from a security breach": https://lnkd.in/dqyYc7rQ
Minimizing the blast radius when authentication is compromised
sgnl.ai
To view or add a comment, sign in
-
Despite substantial investments in endpoint and network security, these incidents demonstrate that current approaches are insufficient. Key strategies include implementing least privilege access controls, defining and monitoring normal identity behavior, and quickly detecting and responding to abnormal activities. #IdentitySecurity https://lnkd.in/gpBb6gbb
Identity: the common denominator behind CDK and other recent breaches
scmagazine.com
To view or add a comment, sign in
-
Identity is the new perimeter? I asked this question of the crowd, and we recorded an episode of The Cyber Ranch Podcast on it! Our guest is Adam Bateman //O, CEO and Co-Founder at Push Security, based in the UK. Another of our cyber friends from across the pond! Adam is a former director at the security consultancy MWR, who were renowned in the industry for their specialist research and red team capability. Adam started off as a red teamer himself, and then went on to build and lead the detection and response division of another firm that specialized in state-sponsored attacks! Adam came up in the world of offensive security, and it shows in his thinking. He co-founded Push to protect SaaS-native companies, whose data resides in a bazillion places, protected by a bazillion identities. Or maybe just by SSO. But probably a mix. ½ a bazillion known SaaS apps using SSO and another ½ a bazillion using who knows what identity methods? Questions I ask Adam, based partly on an earlier thread here on LinkedIn: * In one sense, vulnerable Internet-facing credentials have ALWAYS been a problem. In other words, Identity is not the new perimeter, but is a rather old one. What are your thoughts? * What is happening in the wild? What do the attacks actually look like? * Allan Alford Consulting subscribes to over twenty SaaS applications, and Allan is literally a one-man company. How many SaaS apps are used by the average enterprise? What percentage of those are in the SSO fold? This is truly scary. * How do we get everything behind SSO? How do we get SSO locked down and secure? * What’s our best possible world? Everything behind SSO with a Yubikey? Next best is everything behind SSO with Smartphone MFA app? * Back to this perimeter thing: J. David Christensen, CISSP agrees with the idea that identity is not a new perimeter. He says it has always been THE perimeter! Jamir F. agreed. Robert Mitchell points out that if and identity provider can be compromised, then identity is the M&M defense after all (hard shell, soft center). Our friend Abhishek Singh says authZ and authN combine to form Zero Trust. Once you have zero trust, he says, like it or lump it, identity becomes the attack surface. What are your thoughts on that formula? We found it to be a rather tidy summation, as did our other friend Dan Holden. Thoughts? * Lastly, when we talk identity, we always feel the need to point out that humans are just some of the identities crawling our digital world. Are the solutions we’re crafting for humans using SaaS also good for machine accounts? Application accounts? API-to-API connections? Sponsored by our good friends at Push Security - check then out at https://lnkd.in/gRKYXCTG #informationsecurity #cybersecurity #infosec #ciso
How Push secures your cloud identities and apps
pushsecurity.com
To view or add a comment, sign in
-
The identity attack surface extends far beyond what traditional identity tools can secure – and adversaries continuously take advantage of these unprotected gaps. That's why it's time to rethink the framework around identity security. Read Hed Kovetz's thoughts on Forbes here: https://lnkd.in/euTWyj7R
Council Post: Rethinking The Framework Around Identity Security
forbes.com
To view or add a comment, sign in
-
Explore how ISPM and ITDR, two emerging solutions in cybersecurity, uniquely safeguard identities and enterprise identity infrastructure. Read more here: https://lnkd.in/d8pWa9ik
Navigating the Identity Security Landscape: The Power Duo of ISPM and ITDR
authmind.com
To view or add a comment, sign in
-
#identitysecurityinsights : a deep dive into effects of a recent identity security incident
To view or add a comment, sign in
-
Recent SEC Action Is A Wake-Up Call For Digital Identity Protection https://lnkd.in/eYd_kAPg #infogov #informationgovernance #sec #digitalidentity #digitalidentityprotection #cybersecurity
Council Post: Recent SEC Action Is A Wake-Up Call For Digital Identity Protection
forbes.com
To view or add a comment, sign in
-
Compromised credentials give attackers an advantage. Protect your organization and your digital identities 🔐 by unifying endpoint and identity security on the #crowdstrike #falcon platform. Get in touch today to learn more! https://lnkd.in/eMREz7TP
Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks - crowdstrike.com
crowdstrike.com
To view or add a comment, sign in
-
Modern attacks are on the rise and when the bad guys are logging in — not breaking in — traditional endpoint solutions offer little protection. Learn how unifying endpoint and identity security under the CrowdStrike Falcon platform can help. https://lnkd.in/gVqTuqDs
Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks - crowdstrike.com
crowdstrike.com
To view or add a comment, sign in
-
Modern attacks are on the rise and when the bad guys are logging in — not breaking in — traditional endpoint solutions offer little protection. Learn how unifying endpoint and identity security under the CrowdStrike Falcon platform can help. https://lnkd.in/gByUQJrn
Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks - crowdstrike.com
crowdstrike.com
To view or add a comment, sign in
1,817 followers
IT Professional | IAM AI Enthusiast | Entrepreneurship Advisor | Vocal Artist | Excited for What's Next!
1moThis article is speaking my mind. 😊 Regarding the access review process, I've also experienced situations where managers and system owners approve access based on the user having access in the prior quarter or review periods, leading to 'continuous approval.' Additionally, some reviews lack information on when the user last accessed the application, further complicating the process. The more managers who rubber-stamp access reviews, the more standing access remains intact. I've been wishing to replace standing access with contextual access to prevent 'rubber-stamping,' which will certainly ease the burden on the entire review process. It is much more efficient for each department or role owner to periodically review the policies and permissions each role is assigned. This approach should be something internal and external auditors are open to adopting, especially since every organization is seeking new efficiencies these days. It's a win-win!