RAPID7 RESEARCH REPORT: UNDERSTANDING USER BEHAVIOR ANALYTICS

by Tod Beardsley, Security Research Manager and Roy Hodgman, Data Scientist

Fill out the form below to download the report

According to Verizon's well-regarded Data Breach Investigation Report (DBIR) of 2015, as well as virtually every penetration tester we've talked to over the last several years, the number one method used by attackers to both compromise and extend malicious control over an enterprise network is the use of compromised user credentials. At Rapid7, we couldn't agree more. Our penetration testers know the value of compromised user credentials: with over 850 penetration tests performed in 2015, our skilled contract pen-testers reach their goal nearly 100% of the time in internal assessments, often thanks to a purloined password.