
Sign up to save your podcasts
Or
Attackers are targeting the systems that control access. This includes Active Directory, Azure AD, and recently Okta. Once they have access to identity, attackers can move onto systems that provide access to data and persistence.
Visit https://www.securityweekly.com/psw for all the latest episodes!
Show Notes: https://securityweekly.com/psw735
4.7
3535 ratings
Attackers are targeting the systems that control access. This includes Active Directory, Azure AD, and recently Okta. Once they have access to identity, attackers can move onto systems that provide access to data and persistence.
Visit https://www.securityweekly.com/psw for all the latest episodes!
Show Notes: https://securityweekly.com/psw735
1,965 Listeners
2,013 Listeners
360 Listeners
628 Listeners
368 Listeners
1,014 Listeners
314 Listeners
388 Listeners
7,845 Listeners
942 Listeners
165 Listeners
186 Listeners
188 Listeners
119 Listeners
33 Listeners