Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
The bottom line is that passwords remain one of the weakest links in computer security, for they are easy to steal, hard to secure and provide little proof of the user’s identity. By stealing passwords, the attacker can greatly simplify the attack and effectively bypass security measures designed to stop other types of threats such as malware and exploits. Learn more about credential phishing and abuse and how to prevent it.
Sponsored By Palo Alto Networks