Intelligent Edu.tech Issue 2 | Page 22

More information Allow All Manage Consent Preferences

LATEST INTELLIGENCE

Defending against identity-based attacks

Granting the right user secure access to an enterprise asset goes beyond assigning the correct privileges or authenticating identities. As threat actors pivot to identify-focused attacks, they are targeting services like Active Directory, which organizations overwhelmingly utilize to manage account access. With almost 95 % of Fortune 1000 companies globally using Active Directory, it has become the most widespread directory service in use today. Because of its ubiquity, modern attackers use AD attacks more than any other tactic to steal credentials, escalate privileges, and find targets. In fact the most recent Verizon DBIR study found that over 80 % of breaches were attributed to stolen credentials. When attackers steal and misuse credentials, they can masquerade as legitimate users, access sensitive information, and make it difficult for enterprise security professionals to discern legitimate activity from malicious activity. These scenarios can lead to

attackers gaining greater access and causing more damage to an enterprise’ s cyber estate.
While organizations have deployed Multi-Factor Authentication( MFA) and Privileged Acess Management( PAM) solutions to mitigate the risk of credential-based attacks, they still leave visibility gaps and challenges that attackers can exploit. Alone, they are not enough to fully secure identities and the infrastructure that supports them.
Circumventing MFA and PAM
Although the principles of MFA( prevent unauthorized access by adding another layer of verification to an asset) and PAM( properly secure and control access to privileged accounts) allow enterprises to reduce their cyber risk, advanced attackers have methods that can bypass their protections. ✓
Privacy Preference Center When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Functional Cookies Functional Cookies
PRESENTED BY
22 www. intelligentedu. tech