2 Comments
User's avatar
Rainbow Roxy's avatar

Love this perspective. Your thief-with-keys analogy is spot on for data extortion. It's wild how often the weakest link is just... forgotten credentials. Seems like some companies really needs to audit their old access points more often. Great read!

Expand full comment
Amer Altaf's avatar

Cheers for this. The “thief with keys” bit always lands because it is depressingly real. Half the breaches I see aren’t Hollywood hackers but ghosts with old credentials quietly wandering through doors nobody remembered existed.

It is amazing how many organisations spend millions on shiny controls while leaving abandoned accounts, stale access tokens and forgotten SaaS logins lying around like spare keys under the doormat.

A basic quarterly access audit would shut down half of these attack paths. Not glamorous. Not vendor sexy. Just effective.

The strange part is how avoidable it all is, which makes the consequences even more painful.

Always appreciate you reading and engaging.

If you would like to read more, please subscribe to;

TheControlLayer.substack.com

If you enjoy the content, please feel free to join the members club on the Paid tier.

Happy Reading!

Expand full comment