In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…
Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar for more info.
This document was retrieved from http://www.rsaconference.com/blogs/by/166/maiffret on Tue, 24 Jan 2017 18:18:44 -0500.
© 2017 EMC Corporation. All rights reserved.