© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_4

4. Credential Asset Risks

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

How much money would you spend to secure your passwords from being stolen? If you actually could safeguard all your passwords, would you worry as much about a privileged breach as a vulnerability and exploit? I think the majority of executives and security professionals would ante up a reasonable sum to make this a reality, but protecting an asset is more than security patches and configuration. It is about the damage a compromised privileged account could cost an organization from a momentary perspective and ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.