Defense in Depth podcast - Tracking Anomalous Behaviors of Legitimate Identities
The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.
In this episode:
-
Where are we in terms of monitoring anomalous behavior of our users?
-
Why are we still struggling to understand what happens after threat actors are in our networks?
-
How are new AI-based tools helping us to scale efforts?
-
What’s working and where do we need to improve?

