According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking incidents involve the misuse of stolen credentials. An 18% increase from the previous year’s report. Enterprises are increasingly reliant on outside users, like contractors or agencies, for collaboration on business-critical projects using applications such as Jira or Confluence, increasing the attack surface.
Listen to Akamai security expert Faraz Siddiqui as he shares 5 steps you can take to protect your network against breaches by evolving access policies and solutions for your Atlassian applications or other project management tools.
Topics discussed include:
- What “least privilege” means
- Logging, auditing, and accessing user actions on the network
- How breaches occur with traditional access solutions
- Why a cloud perimeter is key in adopting a zero trust security model
- Fundamentals of cloud delivery