white paper

Credential Theft

Common Mitigations vs. Attacker Behaviors

Attacker objectives, victims, and techniques vary significantly, even when just considering credential theft and misuse.

In this brief we evaluate a few common internet credential theft mitigations and how they can influence known attacker behaviors.

Read this white paper to learn:

  • Attacker objectives – Sophisticated attackers have specific victims in mind. Learn who who they are
  • Attack Techniques – Attackers want to use the most reliable, least expensive, and least risky means to accomplish their goals.
  • How to thawart the most common attack techniques