Malicious cyber actors are realizing the potential in exploiting legacy identity, credentials, and access management (ICAM) systems. Lateral attacks, insider threats, and credential theft are becoming increasingly common and threatening attack vectors used by cyber actors.
Advanced actors are increasingly willing to leverage supply chain exploits of common tools and target high value systems, even where strong authentication may be in place.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Carahsoft Technology Corp. |
Published: | September 28, 2023 |
License: | Copyrighted |
Copyright: | © 2023 Carahsoft Technology Corp |