TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

IT Security Guru

Beyond the perimeter: Why identity and cyber security are one single story

Lara Joseph · 2026-04-28 · Read original ↗

ATT&CK techniques detected

2 predictions
T1078Valid Accounts
85%
"leader ’ s account should not be treated the same as a low privilege user logging in from their usual device. context changes how alerts should be interpreted. the third is noise reduction. without a mature identity and access management approach, security tooling generates volum…"
T1078.004Cloud Accounts
34%
"leader ’ s account should not be treated the same as a low privilege user logging in from their usual device. context changes how alerts should be interpreted. the third is noise reduction. without a mature identity and access management approach, security tooling generates volum…"

Summary

By James Odom, Director of Cyber, and Jim Small, Director of Identity at Hippo Digital   For years, identity and cyber security have been treated as separate disciplines, with identity focusing on authentication, onboarding and access and cyber security focusing on networks, monitoring and threat response. That separation made sense when systems had clearer boundaries. […]

The post Beyond the perimeter: Why identity and cyber security are one single story appeared first on IT Security Guru.