Darktrace Acquired by Private Equity Firm Thoma Bravo in $5 Billion Deal
Shape Security: Preventing Credential Stuffing Attacks
Shape Security: Preventing Credential Stuffing Attacks
Today's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generation of threats that they need to worry about. Organisations must also consider the threats that have stood the test of time. In particular, credential stuffing is one that has persisted over the years. Unfortunately, the misunderstandings surrounding it makes it all-the-more difficult to mitigate.
In this podcast, Shuman Ghosemajumder, CTO at Shape Security, lends his expertise on the matter of credential stuffing. Firstly, he recaps what credential stuffing is and why it is still prevalent to this day. Then, he discusses the impact it has on companies and the best ways for them to mitigate the risks.
Join 34,209 IT professionals who already have a head start
Recommended Content
Trending Content
What is an IoT Attack and How Can you Defend Against it?
What is Data Architecture? Frameworks, Principles, Examples
What is Llama 3? Everything you Need to Know About Meta's New AI
Patient Data Leaked Following Change Healthcare Cyber Attack