{"id":57200,"date":"2024-10-04T19:34:27","date_gmt":"2024-10-04T19:34:27","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/"},"modified":"2024-10-04T19:36:32","modified_gmt":"2024-10-04T19:36:32","slug":"identity-based-attacks-drive-need-for-faster-cybersecurity-defenses","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/","title":{"rendered":"Identity-based attacks drive need for faster cybersecurity defenses"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>Whether or not it\u2019s the <a href=\"https:\/\/siliconangle.com\/2024\/08\/27\/researchers-discover-china-linked-hacking-campaign-targeting-us-internet-providers\/\">Volt Typhoon hack<\/a>\u00a0or one in all a number of different assaults concentrating on the healthcare sector, one thing has grow to be clear: velocity is the secret. As well as, there\u2019s been an increase in identity-based assaults geared toward crippling or, on the very least, disrupting public and private-sector operations.<\/p>\n<div id=\"attachment_672015\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-672015 size-medium\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2024\/09\/IMG_1015-300x200.jpg\" alt=\"Adam Meyers, senior vice president of intelligence at CrowdStrike talks to theCUBE about identity-based attacks at Fal.Con 2024.\" width=\"300\" height=\"200\" data-srcset=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2024\/09\/IMG_1015-300x200.jpg 300w, https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2024\/09\/IMG_1015-768x512.jpg 768w, https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2024\/09\/IMG_1015-800x533.jpg 800w\" data-sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p class=\"wp-caption-text\">CrowdStrike\u2019s Adam Meyers talks about identity-based assaults with theCUBE.<\/p>\n<\/div>\n<p>\u201cWe had a buyer that on a Monday, employed one in all these North Korean distant IT staff,\u201d mentioned\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/adam-meyers-7a58481\/\">Adam Meyers<\/a> (pictured), senior vp of <span style=\"font-weight: 400;\">Counter Adversary Operations<\/span> at CrowdStrike Inc. \u201cBy Saturday, the laptop computer that they have been being issued was shipped to a laptop computer farm the place it was going to be plugged in. It was plugged in on Saturday. Inside an hour, the Overwatch crew notified the client and so they have been capable of terminate the worker. Now we have gotten fairly quick at stopping the threats.\u201d<\/p>\n<p>Meyers spoke with theCUBE Analysis\u2019s\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/dvellante\"><span style=\"font-weight: 400;\">Dave Vellante<\/span><\/a><span style=\"font-weight: 400;\">\u00a0and\u00a0<\/span><a href=\"https:\/\/www.linkedin.com\/in\/rebecca-m-knight-3667a94\/\"><span style=\"font-weight: 400;\">Rebecca Knight<\/span><\/a> at Fal.Con, throughout an unique broadcast on theCUBE, SiliconANGLE Media\u2019s livestreaming studio. They mentioned the significance of velocity in detecting threats, the shift in adversary techniques and the rising function of synthetic intelligence in each cyberattacks and protection. <em>(* Disclosure under.)<\/em><\/p>\n<h3>Id-based assaults on the rise<\/h3>\n<p>A key discovering from CrowdStrike\u2019s <a href=\"https:\/\/www.crowdstrike.com\/resources\/reports\/threat-hunting-report\/\">\u201c2024 Threat Hunting Report\u201d<\/a> is the rising shift in how adversaries are concentrating on organizations. Attackers have moved away from conventional strategies resembling phishing emails containing malware-laden paperwork. As an alternative, they&#8217;re more and more specializing in identity-based assaults, which contain compromising authentic credentials to infiltrate methods undetected, in accordance with Meyers.<\/p>\n<p>\u201cThey know if they arrive in with a compromised however authentic credential, they\u2019ve moved off the X,\u201d he mentioned. \u201cNow, they will proceed to function with out being detected. They\u2019re capable of function as a authentic person who\u2019s simply logged in, possibly, from a distinct location. Id assaults have been most likely the most important subject I believe we\u2019ve coated in that final threat-hunting report.\u201d<\/p>\n<p>Cross-domain risk looking has emerged as efficient towards identity-based assaults.\u00a0By looking throughout totally different domains \u2014 whether or not it\u2019s the endpoint, cloud or hypervisor \u2014 organizations can detect malicious exercise which may in any other case go unnoticed, Meyers added.<\/p>\n<p>\u201cAs you begin to usher in the id safety information and also you begin to usher in your crowd information out of your management aircraft and also you begin to usher in VPN concentrator logs, that\u2019s the place Subsequent-Gen SIEM infused with intelligence and powered by risk looking turns into a extremely vital functionality,\u201d he mentioned.<\/p>\n<p><span style=\"font-weight: 400;\">Right here\u2019s the whole video interview, a part of SiliconANGLE\u2019s and theCUBE Analysis\u2019s protection of <\/span><a href=\"https:\/\/www.thecube.net\/events\/crowdstrike\/falcon-2024\"><span style=\"font-weight: 400;\">Fal.Con<\/span><\/a><span style=\"font-weight: 400;\">:\u00a0<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Adam Meyers, CrowdStrike | fal.con 2024\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/kKBmtBNdmwQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><i><span style=\"font-weight: 400;\">(* Disclosure: CrowdStrike Inc. sponsored this section of theCUBE.)<\/span><\/i><\/p>\n<h5>Photograph: SiliconANGLE<\/h5>\n<div class=\"silic-after-content\" id=\"silic-287619512\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Your vote of assist is vital to us and it helps us preserve the content material FREE.<\/span><\/h3>\n<h3><span style=\"font-size: 16px;\">One click on under helps our mission to supply free, deep, and related content material. \u00a0<\/span><\/h3>\n<h3><a href=\"https:\/\/www.youtube.com\/channel\/UCu3Ri8DI1RQLdVtU12uIp1Q?sub_confirmation=1\">Join our community on YouTube<\/a><\/h3>\n<h3><span style=\"font-size: 16px;\">Be part of the group that features greater than 15,000 #CubeAlumni consultants, together with Amazon.com CEO Andy Jassy, Dell Applied sciences founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and plenty of extra luminaries and consultants.<\/span><\/h3>\n<div>\n<p><figure><strong>\u201cTheCUBE\u00a0is a vital companion to the business. You guys actually are part of our occasions and we actually respect you coming and I do know folks respect the\u00a0content material you create as nicely\u201d \u2013 Andy Jassy<\/strong><\/figure>\n<\/p>\n<\/div>\n<p><strong>THANK YOU<\/strong><\/p>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2024\/10\/04\/falcon-identity-based-attacks-falcon2024\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether or not it\u2019s the Volt Typhoon hack\u00a0or one in all a number of different assaults concentrating on the healthcare sector, one thing has grow&#8230;<\/p>\n","protected":false},"author":1,"featured_media":57201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-57200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T19:34:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T19:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Identity-based attacks drive need for faster cybersecurity defenses\",\"datePublished\":\"2024-10-04T19:34:27+00:00\",\"dateModified\":\"2024-10-04T19:36:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Adam-Meyers-Clean-Thumb.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/\",\"name\":\"Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Adam-Meyers-Clean-Thumb.jpg\",\"datePublished\":\"2024-10-04T19:34:27+00:00\",\"dateModified\":\"2024-10-04T19:36:32+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Adam-Meyers-Clean-Thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Adam-Meyers-Clean-Thumb.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/10\\\/04\\\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity-based attacks drive need for faster cybersecurity defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/","og_locale":"en_US","og_type":"article","og_title":"Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2024-10-04T19:34:27+00:00","article_modified_time":"2024-10-04T19:36:32+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Identity-based attacks drive need for faster cybersecurity defenses","datePublished":"2024-10-04T19:34:27+00:00","dateModified":"2024-10-04T19:36:32+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/","url":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/","name":"Identity-based attacks drive need for faster cybersecurity defenses - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg","datePublished":"2024-10-04T19:34:27+00:00","dateModified":"2024-10-04T19:36:32+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/10\/Adam-Meyers-Clean-Thumb.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/10\/04\/identity-based-attacks-drive-need-for-faster-cybersecurity-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Identity-based attacks drive need for faster cybersecurity defenses"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/57200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=57200"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/57200\/revisions"}],"predecessor-version":[{"id":57202,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/57200\/revisions\/57202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/57201"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=57200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=57200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=57200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}