Thank you for sharing!

Your article was successfully shared with the contacts you provided.

The recent and massive database breach at Equifax serves to highlight the insider threat that database systems face today. But you say, “The Equifax database attack was perpetrated by external hackers, not internal personnel.” While that’s true, it is also true that once the Equifax database attackers circumvented the corporate firewalls and breached the application, they were able to masquerade as legitimate and authorized insiders. To identify an attack of that nature requires tools that detect insider threats. To better understand all of this, let’s walk through the Equifax database attack chain.

Credit Union Times

Join Credit Union Times

Don’t miss crucial strategic and tactical information necessary to run your institution and better serve your members. Join Credit Union Times now!

  • Free unlimited access to Credit Union Times' trusted and independent team of experts for extensive industry news, conference coverage, people features, statistical analysis, and regulation and technology updates.
  • Exclusive discounts on ALM and Credit Union Times events.
  • Access to other award-winning ALM websites including TreasuryandRisk.com and Law.com.

Already have an account? Sign In Now
Join Credit Union Times

Copyright © 2019 ALM Media Properties, LLC. All Rights Reserved.