InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How To Find and Manage Leaked Credentials On The Dark Web

Presented by

John Wetzel, Director of Intelligence Solutions & Trevor Lyness, Product Marketing Manager, Recorded Future

About this talk

Cybercriminals love leaked credentials. In fact, leaked credentials are involved in 61% of breaches. But leaked credentials can be difficult to discover due to the fact that cybercriminals trade them on the dark web and other underground channels, well outside the traditional visibility of many organizations. And taking action on discovered credentials is easier said than done thanks to large and messy data sets and varying internal requirements. Identifying and managing leaked credentials doesn't need to be difficult. In this on-demand webinar recorded on 1 December 2021, Recorded Future experts John Wetzel and Trevor Lyness will take a deep dive on the leaked credentials market.
Recorded Future Asia Pacific

Recorded Future Asia Pacific

4127 subscribers71 talks
Security Intelligence: Your Single Source of Truth
Recorded Future delivers meaningful results for our clients. Whether it’s improving efficiency for research and triage, slashing time to threat detection, or improving your organization’s bottom line, we are dedicated to saving our clients time and money — in addition to measurably reducing risk. We believe that intelligence is the key to unlocking the potential of security programs – and protecting our organizations and communities. We believe that security solutions should do just that: be solutions – helping to solve big problems and reduce risk. We know that the right intelligence, in the hands of the right people, at the right time, stops attackers in their tracks.
Related topics