cso_online

Identity as an attack surface

Instead of targeting networks and applications, more and more bad actors are exploiting identities Thanks to mobile computing, cloud apps and tele-working, the de-perimeterization of ...