Attack Path Analysis: How Hackers Exploit NHIs
Автор: OASIS Security
Загружено: 2024-09-16
Просмотров: 274
In this webinar, Ido Geffen, VP of Product at Oasis Security, discusses the rising importance of non-human identities (NHIs). By analyzing recent breaches, including incidents involving Microsoft, Okta, and Mercedes Benz, Ido highlights the vulnerabilities associated with NHIs, providing strategic insights and proactive measures for managing NHIs to safeguard organizations against evolving cyber threats. The session emphasizes the necessity of visibility, lifecycle management, and tailored security strategies for mitigating risks posed by NHIs.
Key takeaways:
Understanding Non-Human Identities (NHIs) and Their Appeal to Attackers
Real-World Examples of NHI Exploitation
Challenges in Managing Non-Human Identities
Strategic Approaches to NHI Management
Proactive Measures for Securing NHIs
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: