×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Red Team Insights on Pandemic Driven Security Vulnerabilities

June 10, 2020


In response to the pandemic, most organizations had to execute on business continuity plans. While some employees had experience in working remotely, many did not. Also, the focus of employees working remotely in today’s “new norm” is often diverted to family, health, adjusting to new technology and much more. Attackers, on the other hand, remain patiently focused on ways to gain a foothold into an organization. It’s all about credentials, lateral movement and escalation to achieve goals. 


Watch this webinar for insights on how attackers can:

• Compromise VPNs and jump stations with relative ease
• Steal privileged credentials and bypass Multi-factor Authentication (MFA) 
• Perform lateral movement in BYOD instances
 

Previous Article
Understanding CyberArk SCIM Server and Cross-Domain Identity Management
Understanding CyberArk SCIM Server and Cross-Domain Identity Management

An overview of SCIM and value of the CyberArk SCIM server.

Next Article
Top Privileged Access Management Use Cases
Top Privileged Access Management Use Cases

Download this infographic to learn the top 6 use cases for Privileged Access Management.