Daisy Chain Authentication

An attacker can piece together a collection of accounts within an organization using public information and compromised data, building a 'daisy chain' to a target. With the upsurge of cloud-based services and web-facing applications, many organizations face a larger attack space for compromise....
By
Courtney Imbert
August 8, 2013

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg