Defense in Depth cover image

Tracking Anomalous Behaviors of Legitimate Identities

Defense in Depth

CHAPTER

Introduction

This chapter explores the challenges faced in tracking anomalous behaviors by threat actors who abuse legitimate credentials within networks. The hosts discuss the prevalence of breaches involving legitimate credentials and the potential of AI in addressing this issue.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner