Jul 14, 2015
Massive database breaches have resulted in millions of user identification and authentication profiles being compromised. Identifying unauthorized attempts to access systems or accounts is a basic requirement for financial institutions, etailers, retailers, healthcare provides and other enterprises.
Knowing the difference between employee and attacker behavior is key to avoiding security alert fatigue and using scarce resources to parse the good from the bad access attempts.
Further, collecting information about rogue takeovers for forensics purposes is a a good idea. Security Current's Vic Wheatman speaks on these issues and others with Mark Seward, Vice President of Marketing for Exabeam in this sponsored podcast.