> Research Library > Palo Alto Networks > Understanding the Role of Stolen Credentials in Data Breaches
 

Understanding the Role of Stolen Credentials in Data Breaches

White Paper Published By: Palo Alto Networks
Palo Alto Networks
Published:  Apr 25, 2017
Type:  White Paper
Length:  4 pages

Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain the user.



Tags : 

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee