A new book identifies how identities, credentials, passwords and exploits can be leveraged to escalate privileges during an attack and breach an environment. Written by BeyondTrust’s CTO Morey Haber and COO Brad Hibbert, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organisations details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organisations must adopt.