Tuebora Blog

Communicate Your IAM Intent Directly to You Applications

Identity Attack Vectors (Methods and Tactics)

Identity attack vectors extend the surface area for cyber attacks beyond the open ports, database vulnerabilities, and insecure protocols that malicious intruders often seek to exploit. The purpose of identity attacks is to compromise identities on a network and impersonate that identity for a nefarious purpose. This article describes identity attack vectors by focusing on the methods and tactics used to take over compromised identities on a corporate network. 

Read More

Analyzing the Colonial Pipeline Cyber Attack from An Identity Management Perspective

 

Read More

How IAM Supports A Zero Trust Security Model

 

Read More