credentials theft

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: IBM     Published Date: Mar 11, 2015
Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, credentials theft, identity management policies, anti-malware software
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, threat, ciso, enterprise, security, data
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis
    
IBM
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.