© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_14

14. Evolving Identity Security Threats

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

By executing well on the preceding steps, you will address most of your identity security needs, eliminate or mitigate many identity attack vectors, and vastly reduce your threat surface. This is something you can tangibly measure when you see the number of alerts, investigations, and incidents decrease in your Security Operations Center (SOC).

However, most emerging technologies that have the power to transform IT come with security challenges, such as how to ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.