Writes Luis P. Almeida:

Lew,

Here’s the introductory paragraph of an industry analyst report on privileged user management.

“With organizations embracing the cloud in conjunction the mobile evolution, ensuring the rigorous management of privileged users has become a business imperative. Where the exploits of a nation-state attack may read like a suspense novel, what goes unreported is the fact that even some of the most advanced attacks require privileged credentials, for example the username and password of a SAP administrator, to succeed. The media, too, tends to focus on external threat actors like nation-states or organized criminal gangs while ignoring the threat from the insider or, more importantly, the privileged insider. Let’s not forget that Edward Snowden, of the USA, used or abused his privileged credentials to cause untold damage to national security. Simply put, even the most sophisticated attacker would find it almost impossible to succeed without having access to privileged credentials.” – Marting Kuppinger

Assange has told us that Russia was not involved. We have a recently published forensic analysis that the data leaked via a USB thumb drive and yet the media insists with their fantasy that Russia was involved.

Here’s to this being the beginning of the end for the manipulators in the mainstream media.

Luis