Advertisement

Privileges

  • Morey J. Haber
Chapter
  • 43 Downloads

Abstract

Today, privileges based on credentials are one of the lowest-hanging fruits in the attack chain. They are currently the easiest method for a threat actor to own a resource and, ultimately, the entire environment. These threats include

Copyright information

© Morey J. Haber 2020

Authors and Affiliations

  • Morey J. Haber
    • 1
  1. 1.HeathrowUSA

Personalised recommendations