Ponemon Report: The Cost of Credential Stuffing

Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ websites. Based on their responses, Ponemon identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed.

What you need to know:

  • Credential stuffing activity is difficult to distinguish from legitimate users
  • The volume and severity of credential stuffing attacks are on the rise
  • Most companies lack good visibility into credential stuffing activity on their websites

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Akamai Technologies logo
Provided by:
Akamai Technologies
Topic:
Security
Format:
PDF