With the release of the film "Snowden," Phoenix-based security company BeyondTrust reviewed common security weaknesses organizations shared with the 2013 U.S. classified information breach, especially in the use of privileged credentials.

"Regardless of the film's historical accuracy, the fact is Snowden was an administrator, he was a trusted insider and he used various insider techniques to steal a ton of data," Morey Haber, vice president of technology, at BeyondTrust, said.

"No one monitored the administrator," Haber said. Snowden used demonstrated weaknesses in cybersecurity defense to hack his own workplace: leverage unmonitored privileged access to copy and exfiltrate sensitive information; and cause significant damage with the data.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.