Blog Post

Microsoft Security Blog
4 MIN READ

Bridging the On-premises to Cloud Security Gap: Cloud Credentials Detection

TamirFriedman's avatar
TamirFriedman
Icon for Microsoft rankMicrosoft
Aug 07, 2024
Identities lie at the heart of cloud security. One of the most common tactics used to breach cloud environments is Credential Access. User credentials may be obtained using various techniques. Creden...
Updated Aug 08, 2024
Version 2.0