Identity, deception and compromised credentials

Stolen or compromised identities have been an attack vector for years, if not decades. Even now, organisations are failing to protect against compromised identity. Identity is one of security’s critical weak spots. But why is this? 

Once an attacker breaches defences, it is still too easy for them to move laterally, and to attack higher value targets. Or, as we’ve seen recently, attack an organisation with ransomware.

Our guest this week is chief security architect and formally the chief deception officer at Attivo Networks, Carolyn Crandall.

She argues that it is changing technology and changing work patterns, with the need to access information anywhere, and at any time, that is making these attacks both more common. And it is also making them more damaging.

But we can address this in a number of ways, she suggests. This includes better use of strong authentication, and deception and lures to monitor networks. Does that raise practical and ethical issues? And will boards make the investment to secure credentials?

Interview by Stephen Pritchard

Featured image: Gerd Altmann from Pixabay