They don't break in, they log in. What's an enterprise to do?

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this podcast James Wilson chats with Brad Arkin about how enterprises can better deal with attackers logging in with valid credentials. Stolen identities, weak special-use credentials, and over-scoped API keys are the new zero-day and they’re abundantly available to attackers. Sadly, the solution here isn’t as simple as deploying phishing resistant MFA. Fixing this takes an enterprise identity strategy.

They don't break in, they log in. What's an enterprise to do?
0:00 / 32:02