Defense in Depth cover image

Tracking Anomalous Behaviors of Legitimate Identities

Defense in Depth

00:00

Introduction

This chapter explores the challenges faced in tracking anomalous behaviors by threat actors who abuse legitimate credentials within networks. The hosts discuss the prevalence of breaches involving legitimate credentials and the potential of AI in addressing this issue.

Play episode from 00:00
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app