What has been the volume of Credential Stuffing attacks targeting your business this year?
Significant Increase30%
Slight Increase51%
No Change15%
Decrease2%
232 PARTICIPANTS
1.5k views
Content you might like
Has anyone been successful in implementing a FinOps Cost Optimization policy to turn down idle cloud instances during off hours (nights/weekends)? DId you start with non-prod environments? How are you handling logging/monitoring alerts during that time?
Anyone using Hashicorp to drive privileged Access management PW compliance by any chance? if yes, any challenges pulling data from the solution and matching secrets to privileged IDs?
Can anyone share how they have partnered with HR to prevent shadow agents from accessing HR data outside of sanctioned AI platforms/tools?
Has your organization had to modernize legacy systems in order to integrate with GenAI tools or capabilities?
Yes89%
No11%
If you had to upgrade an employee to Windows 11 manually, how long do you estimate it would take your team to complete the following capability check for: Secure Boot
0 - 15 mins15%
15 - 30 mins63%
30 - 45 mins16%
+45 mins5%
View Results
What sets us apart?
No selling.
No recruiting.
No self promotion.
Read Our GuidelinesTrusted peer advice and insights for technology professionals.