Privileged Accounts Play Key Role In Advanced Cyber Attacks

By Eric Noonan • April 13, 2013

By Fahmida Rashid in SECURITY WEEK

Malware and attackers are increasingly targeting privileged accounts as part of multi-stage operations where they breach networks, gather information, and exfiltrate sensitive data, according to a recent report from security firm CyberSheath.

Theft, misuse, and exploitation of privileged accounts is a “key tactic” in each phase of advanced persistent threat and other targeted attack campaigns, CyberSheath wrote in its APT Privileged Account Exploitation report released Wednesday. CyberSheath’s “descriptive benchmark study” interviewed ten “leaders in the cyber community” heading security efforts at major U.S.-based corporations, along with former government executives.

Read the full article here.

Cybersheath Blog

CMMC Compliance Dashboard: Gain New Visibility into Compliance

CMMC is not a compliance framework. It’s a maturity model. That has big implications for how you approach compliance, but also how you keep track of all the elements that make up compliance. And yet, visibility has been one of the most difficult challenges facing DIB contractors. It used to…

CMMCEnclave: Add Versatility with a More Flexible Approach

The enclave approach to CMMC compliance is one of the most cost effective and least disruptive ways to safeguard CUI. You can maintain high-value custodial security of CUI without upending your existing processes, procedures, and people. That way, you can maintain the proper level of CMMC compliance and remain eligible…

How to Offboard Your Managed Services Provider

For any of a variety of reasons including lack of communication, slow response times, or prolonged downtime, your organization has decided to change your managed service provider (MSP). Whether you have already signed an agreement with a new MSP or you are actively looking for a replacement, now is the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft