white paper
Credential Theft
Common Mitigations vs. Attacker Behaviors

Attacker objectives, victims, and techniques vary significantly, even when just considering credential theft and misuse.
In this brief we evaluate a few common internet credential theft mitigations and how they can influence known attacker behaviors.
Read this white paper to learn:
- Attacker objectives – Sophisticated attackers have specific victims in mind. Learn who who they are
- Attack Techniques – Attackers want to use the most reliable, least expensive, and least risky means to accomplish their goals.
- How to thawart the most common attack techniques
