Ponemon Report: The Cost of Credential Stuffing

Download Now
Provided by: Akamai Technologies
Topic: Security
Format: PDF
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ websites. Based on their responses, Ponemon identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed.

What you need to know:
  • Credential stuffing activity is difficult to distinguish from legitimate users
  • The volume and severity of credential stuffing attacks are on the rise
  • Most companies lack good visibility into credential stuffing activity on their websites
Download Now

Find By Topic