Listen "Identity, deception and compromised credentials"
Episode Synopsis
Stolen or compromised identities have been an attack vector for years, if not decades. Even now, organisations are failing to protect against compromised identity. Identity is one of security’s critical weak spots. But why is this?
Once an attacker breaches defences, it is still too easy for them to move laterally, and to attack higher value targets, or as we've seen recently, attack an organisation with ransomware.
Our guest this week is chief security architect and formally the chief deception officer at Attivo, Carolyn Crandall
She argues that it is changing technology and changing work patterns, with the need to access information anywhere, and at any time, that is making these attacks both more common, and more damaging.
Interview by Stephen Pritchard
Once an attacker breaches defences, it is still too easy for them to move laterally, and to attack higher value targets, or as we've seen recently, attack an organisation with ransomware.
Our guest this week is chief security architect and formally the chief deception officer at Attivo, Carolyn Crandall
She argues that it is changing technology and changing work patterns, with the need to access information anywhere, and at any time, that is making these attacks both more common, and more damaging.
Interview by Stephen Pritchard
More episodes of the podcast Security Insights
Resilience in cyber: an agony aunt's view
18/12/2025
Insights Interview: Chris Dimitriadis, ISACA
13/11/2025
Ukraine, cyberwar and CNI
30/10/2025
Bug bounties: risks and rewards
16/10/2025
DDoS, geopolitics and AI
02/10/2025
Cyber skills: a crisis of our own making?
18/09/2025
Vulnerabilities, CVEs and the attack surface
21/08/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.