Defense in Depth cover image

Tracking Anomalous Behaviors of Legitimate Identities

Defense in Depth

00:00

Introduction

This chapter explores the challenges faced in tracking anomalous behaviors by threat actors who abuse legitimate credentials within networks. The hosts discuss the prevalence of breaches involving legitimate credentials and the potential of AI in addressing this issue.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app