Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
Compromised Credentials in 2024: What to Know About the World’s #1 Attack Vector
Channel

Compromised Credentials in 2024: What to Know About the World’s #1 Attack Vector

Truth in IT
06/06/2024
Credentials, made up of passwords and usernames, serve as the keys to our online existence.

According to Lastpass, professionals manage up to 200 sets of credentials on average.

When credentials are compromised, cyber attackers gain frictionless entry into sensitive systems and can often move laterally to find your crown jewels.

This webinar dives into the specifics of compromised credentials attacks, execution methods, what the bad guys do with the stolen identities, and preventative best practices.
Categories:
  • » Cybersecurity » Data Security
  • » Events » Spotlight Events
  • » Cybersecurity
Tags:
  • lacework
  • cybersecurity
  • cyberattack

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

                Channel's Comments: Compromised Credentials in 2024: What to Know About the World’s #1 Attack Vector

                Upcoming Webinar Calendar

                • 03/19/2026
                  11:00 AM
                  03/19/2026
                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                  https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
                • 03/19/2026
                  01:00 PM
                  03/19/2026
                  Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                  https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
                • 03/26/2026
                  01:00 AM
                  03/26/2026
                  Reclaim Network Clarity and Accountability with Netskope DEM
                  https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
                • 03/26/2026
                  05:00 AM
                  03/26/2026
                  ITDR's Role in Strengthening Critical Security Architecture
                  https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                  https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  Making GPUs Available On Demand (Without Breaking the Budget)
                  https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
                • 04/08/2026
                  01:00 PM
                  04/08/2026
                  Managing Configuration at Scale Across Group Policy and Intune
                  https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
                • 04/15/2026
                  01:00 PM
                  04/15/2026
                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                  https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
                • 04/30/2026
                  10:00 AM
                  04/30/2026
                  SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                  https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

                Upcoming Events

                • Mar
                  19

                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                  03/19/202611:00 AM ET
                  • Mar
                    19

                    Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                    03/19/202601:00 PM ET
                    • Mar
                      26

                      Reclaim Network Clarity and Accountability with Netskope DEM

                      03/26/202601:00 AM ET
                      • Mar
                        26

                        ITDR's Role in Strengthening Critical Security Architecture

                        03/26/202605:00 AM ET
                        • Mar
                          26

                          HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                          03/26/202601:00 PM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version