A Model for Leveraging the Complexity of Identities
ATT&CK techniques detected
T1078Valid Accounts
42%
"##ttended and unlocked. while examples of malicious use of unlocked devices by other employees or device theft are reasonable, the less nefarious example of the employee ’ s child or roommate using the device and unintentionally introducing malware is much more likely. mitigation…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
The term identity is everywhere in security, but we rarely discuss or deal with all of the depth and complexity it entails. Sam Bisbee explores the layers inherent in identity and what they mean for managing risk.