In many data breaches, your IT team or someone else with the right privileges has been co-opted. By the time an attacker is lifting data from your servers, they are no longer hacking but simply using stolen user credentials and passwords. And in many of those instances, the way they are moving through your environment is not via any custom tools, but by taking advantage of administrative features…
Are you interested in contributing to the RSA Conference blog? Download our 2017 Editorial Calendar for more info.
This document was retrieved from http://www.rsaconference.com/blogs/by/166/maiffret on Wed, 22 Mar 2017 22:22:44 -0400.
© 2017 EMC Corporation. All rights reserved.