Threat Vector by Palo Alto Networks cover image

The 90,000 Credential Wake-Up Call

Threat Vector by Palo Alto Networks

00:00

Intro

This chapter explores a major cloud extortion campaign that compromised numerous credentials across numerous accounts, underscoring the importance of identity management. It also highlights the critical need for posture management, runtime security, and threat intelligence to protect against and recover from these vulnerabilities.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app