Video: Credential Stuffing (Core Identity and Access Management Part 1 of 8)
Kayne McGladrey
Field CISO at Hyperproof | Improving GRC Maturity and Leading Private CISO Roundtables | Cybersecurity, GRC, Author, Speaker
Credential Stuffing is not a new attack. Rather it is an existing attack that threat actors have found a way to operate at economies of scale. Credential stuffing is a type of automated threat used to verify the validity of stolen account credentials through a large-scale automated login process against a web application and has been around for quite some time. In this video, Kayne McGladrey, Integral Partners Director of Information Security Services will show:
? how threat actors can purchase stolen credentials on the dark web
? what their process is for credential stuffing
In this first episode in the series of 8 about Identity and Access Management, you will better understand how a consulting organization can protect against credential stuffing, and other identity based threats.