2 Comments
User's avatar
Phil T's avatar

Excellent analysis, James. I hope other folks are paying attention to your recommendations for securing privileged access!

James McCabe | ModernCYPH3R's avatar

Appreciate the comment Phil. This one was interesting since it was so easy for Handala to pull off. Every CISO should be re-evaluating its admin permission workflow.