Provided by: SecurityTube.net
Topic: Data Management
In spite of large increases in company security budgets and the hiring of additional personnel, an increasing number of exponentially larger data breaches continue to occur. For the attacker, valid credentials are the most coveted item. Valid credential use by an attacker facilitates many actions in the attack chain.