With any security posture, visibility is important—knowing your environment, its activity, and where your data resides. But what about your data that lives outside your environment? That is, the data in the hands of companies whose services and tools you use.
Every organization employs third-party tools, from the largest enterprise to the smallest mom-and-pop shop. In every case, organizations must share data or open up connections with these third-party providers. The recent Lapsus$ hack into Okta was just the latest in a string of high-profile incidents involving third-party providers.
In this month’s Threat Intel Report, we look at highlights of the recent string of Lapsus$ attacks including Okta; we touch on the importance of third-party risk management; and we update with a summary of the Ukraine war.
![]() |
View the Report |