Identity and Access: The Game is the Same – It Just Got Fiercer
CyberSecurity Insiders
JUNE 15, 2022
The threat actor gang, known as Lapsus$, gained access to the laptop of one of Okta’s third-party support engineers for five days, potentially affecting a small number of the company’s customers. Access to systems should be monitored not only for policy compliance, but also for known malicious behaviors.
Let's personalize your content