{"id":113021,"date":"2025-07-18T17:04:32","date_gmt":"2025-07-18T09:04:32","guid":{"rendered":"https:\/\/version-2.com\/?p=113021"},"modified":"2025-07-17T17:06:40","modified_gmt":"2025-07-17T09:06:40","slug":"understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/07\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\/","title":{"rendered":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"113021\" class=\"elementor elementor-113021\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25f39c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25f39c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05f590f\" data-id=\"05f590f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6692190 elementor-widget elementor-widget-text-editor\" data-id=\"6692190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"uui-text-rich-text-2 w-richtext\"><p>In the latest episode of the <strong>Security by Default<\/strong> podcast, host <strong>Joe Carson<\/strong> sits down with seasoned cybersecurity expert <strong>Filipi Pires<\/strong> for a thought-provoking conversation on one of the most critical\u2014and often overlooked\u2014aspects of modern security: <strong>identity threats<\/strong>.<\/p><p>With over a decade of experience spanning both technical and sales roles, Filipi brings a well-rounded perspective to the discussion, highlighting the growing importance of identity in the evolving cybersecurity landscape. Their conversation offers valuable lessons for practitioners, business leaders, and anyone invested in building more resilient, security-conscious organizations.<\/p><figure class=\"w-richtext-align-fullwidth w-richtext-figure-type-image\" style=\"max-width: 1080px;\"><div><img decoding=\"async\" src=\"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\" alt=\"\" \/><\/div><\/figure><h2><strong>Why Identity Is the New Battleground<\/strong><\/h2><p>In today\u2019s threat landscape, <strong>identity<\/strong> has become a prime target for attackers. As Filipi points out, it\u2019s no longer just about exploiting systems or networks. Gaining access to identities unlocks the keys to the kingdom.<\/p><blockquote><p><em>\u201cIdentity is central to everything we do in security,\u201d<\/em> Filipi explains. <em>\u201cIf you compromise an identity, you bypass so many of the traditional controls.\u201d<\/em><\/p><\/blockquote><p>This shift has elevated the role of <strong>identity threats<\/strong> from phishing and credential theft to privilege escalation and misuse of misconfigured accounts. Yet many organizations still underestimate how <strong>misconfigurations<\/strong>, overlooked credentials, and legacy identity systems can quietly erode their defenses.<\/p><p>\u200d<\/p><h2><strong>Misconfigurations: The Silent Weakness<\/strong><\/h2><p>One of the recurring challenges discussed in the episode is the persistent problem of <strong>misconfigurations<\/strong>. Despite advancements in technology, simple oversights\u2014such as exposed administrative accounts, poorly managed permissions, or forgotten legacy systems\u2014remain among the top causes of breaches.<\/p><p>Filipi emphasizes that misconfigurations aren&#8217;t always the result of negligence. Often, they stem from complexity, rapid growth, or lack of visibility. That\u2019s where the concept of <strong>observability<\/strong> becomes critical.<\/p><blockquote><p><em>\u201cYou can\u2019t secure what you can\u2019t see,\u201d <\/em>Filipi reminds us. <em>\u201cObservability gives you the insight to spot weak points before attackers do.\u201d<\/em><\/p><\/blockquote><p>\u200d<\/p><h2><strong>Tools Are Just the Beginning<\/strong><\/h2><p>With countless cybersecurity tools flooding the market, Filipi and Joe caution against becoming overly reliant on technology without understanding the underlying <strong>techniques<\/strong>.<\/p><blockquote><p><em>\u201cTools are there to help you learn and uncover patterns,\u201d<\/em> Filipi says. <em>\u201cBut if you don\u2019t understand how attackers operate, the tools alone won\u2019t save you.\u201d<\/em><\/p><\/blockquote><p>This mindset aligns with the growing emphasis on <strong>research<\/strong>, experimentation, and reverse engineering in the community. It\u2019s through continuous learning and hands-on exploration that defenders stay ahead of adversaries.<\/p><p>\u200d<\/p><h2><strong>Community, Learning, and Respecting the Journey<\/strong><\/h2><p>Beyond technical skills, both Filipi and Joe underscore the importance of <strong>community engagement<\/strong> in cybersecurity. Conferences, podcasts, online forums, and mentorship all play vital roles in building collective knowledge.<\/p><p>Filipi shares a personal reminder for anyone navigating their cybersecurity career:\u00a0<\/p><blockquote><p><em>\u201cRespect the journey. Everyone starts somewhere, and growth comes from persistence and curiosity.\u201d<\/em><\/p><\/blockquote><p>Whether you&#8217;re a seasoned expert or just starting out, cybersecurity is a field where being humble, learning, and community matter as much as technical prowess.<\/p><p>\u200d<\/p><h2><strong>Final Thoughts: Building Identity-Aware, Resilient Security<\/strong><\/h2><p>This episode reinforces a key message for modern defenders: protecting identities isn\u2019t optional\u2014it\u2019s foundational to cybersecurity resilience.<\/p><p>By addressing misconfigurations, prioritizing observability, leveraging tools with purpose, and staying engaged with the community, organizations can build stronger defenses against evolving identity threats.<\/p><p>As the conversation between <strong>Filipi Pires<\/strong> and <strong>Joe Carson<\/strong> reminds us, effective cybersecurity is never static. It\u2019s a continuous process of learning, adapting, and respecting the complex, human-driven journey that defines our industry.<\/p><p>\u200d<\/p><h3>Listen to the full podcast episode on the Security by Default podcast Now!<\/h3><div class=\"w-embed w-iframe\"><div style=\"width: 100%; height: 200px; margin-bottom: 20px; border-radius: 6px; overflow: hidden;\"><iframe style=\"width: 100%; height: 200px;\" src=\"https:\/\/player.captivate.fm\/episode\/b5e2bdcb-4c84-46fd-9a38-4c6a649a397c\/\" frameborder=\"no\" scrolling=\"no\" seamless=\"\"><\/iframe><\/div><\/div><figure class=\"w-richtext-align-center w-richtext-figure-type-image\"><div><img decoding=\"async\" src=\"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993cc2316ffb96b50c36_AD_4nXdEHq1sqz2pbRNeZmTN6wZrQxLJuslZ1K_Le8XwJRpqQffp9WZ-2349PBvV1-0NeHDdvLd61JzYDX7yVEPH136b-38A3cvhGp4WhAeFwtJFQV57DX26O4Pb-XzLUhVI3hXinT1qZQ.png\" alt=\"\" \/><\/div><\/figure><p>\u200d<\/p><h3><strong>Catch Filipi Pires at Three Cybersecurity Conferences This August<\/strong><\/h3><p>Filipi Pires is hitting the summer circuit with a powerful trio of talks across BSides Las Vegas, Black Hat USA, and DEF CON 33 each focused on identity, cloud misconfigurations, and practical security tooling.<\/p><ul role=\"list\"><li><strong>\ud83d\udccd BSides Las Vegas<br \/><\/strong> <strong>Talk:<\/strong> <em>Machine Identity &amp; Attack Path: The Danger of Misconfigurations<br \/><\/em> <strong>Date &amp; Time:<\/strong> Tuesday, August 5 | 2:00\u20132:45 PM (GMT+1)<br \/>Filipi explores how attackers exploit misconfigured security and unmanaged machine identities in multi-cloud environments. Learn how to visualize IAM risks using open-source tools like SecBridge, Cartography, and AWSPX.<\/li><li><strong>\ud83d\udccd Black Hat USA \u2013 Arsenal Station 3<br \/><\/strong> <strong>Talk:<\/strong> <em>APIDetector v3 \u2013 Advanced Swagger Endpoint Scanner with Real-time Web Interface<br \/><\/em> <strong>Date &amp; Time:<\/strong> Thursday, August 7 | 1:00\u20131:55 PM<br \/>Get hands-on with APIDetector v3, the latest version of an advanced tool for finding exposed Swagger\/OpenAPI endpoints. Now with real-time results, screenshot capture, and bulk scanning support.<\/li><li><strong>\ud83d\udccd DEF CON 33 \u2013 Cloud Village<br \/><\/strong> <strong>Talk:<\/strong> <em>Transforming Identity Protection: Innovating with AI and Attack Paths<br \/><\/em> <strong>Date &amp; Time:<\/strong> Friday, August 8 | 2:10\u20132:40 PM (GMT+1)<br \/>Discover how generative AI and graph visualizations can predict and prevent misconfigurations across AWS, Azure, GCP, and OCI. Filipi showcases tools like Neo4j and Memgraph to map identity risk and attack paths in the cloud.<\/li><\/ul><p><strong><em>Whether you&#8217;re a cloud defender, API hunter, or identity strategist, Filipi\u2019s talks deliver the tools and insights to secure your ecosystem against today\u2019s threats.<\/em><\/strong><\/p><div class=\"w-embed\"><hr style=\"width: 100%; height: 1px; background-color: #003a32; border: none;\" \/><\/div><p>\u200d<\/p><p><em>If you want to see firsthand how protecting identities can transform your organization&#8217;s security, don&#8217;t miss the chance to discover Segura\u00ae&#8217;s platform.\u00a0<br \/>\u200d<\/em><\/p><p><em>Our solution is designed to help organizations identify vulnerabilities, prevent misconfigurations, and enhance visibility into identity usage\u2014all in a simple and effective way.\u00a0<\/em><\/p><p><strong><em>Ready to take the next step toward truly resilient defense? <\/em><\/strong><a href=\"https:\/\/segura.security\/demo\"><strong><em>Request a free demo of Segura\u00ae now<\/em><\/strong><\/a><strong><em> and discover how we can strengthen your company&#8217;s security together!<\/em><\/strong><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a3d4f6 elementor-widget elementor-widget-spacer\" data-id=\"6a3d4f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the latest episode of the Security by Default podcas [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,419,61],"tags":[420,1077],"class_list":["post-113021","post","type-post","status-publish","format-standard","hentry","category-1305","category-segura","category-press-release","tag-segura","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2\" \/>\n<meta property=\"og:description\" content=\"In the latest episode of the Security by Default podcas [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T09:04:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson\",\"datePublished\":\"2025-07-18T09:04:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\\\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/67daf5363982915ea2ad8760\\\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\",\"keywords\":[\"Segura\",\"2025\"],\"articleSection\":[\"2025\",\"Segura\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\\\/\",\"url\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity\",\"name\":\"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/67daf5363982915ea2ad8760\\\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\",\"datePublished\":\"2025-07-18T09:04:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#primaryimage\",\"url\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/67daf5363982915ea2ad8760\\\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\",\"contentUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/67daf5363982915ea2ad8760\\\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/segura.security\\\/post\\\/understanding-identity-threats-in-cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity","og_locale":"zh_HK","og_type":"article","og_title":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2","og_description":"In the latest episode of the Security by Default podcas [&hellip;]","og_url":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity","og_site_name":"Version 2","article_published_time":"2025-07-18T09:04:32+00:00","og_image":[{"url":"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/07\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson","datePublished":"2025-07-18T09:04:32+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/07\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\/"},"wordCount":878,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png","keywords":["Segura","2025"],"articleSection":["2025","Segura","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/07\/understanding-identity-threats-in-cybersecurity-insights-from-filipi-pires-and-joseph-carson\/","url":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity","name":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#primaryimage"},"image":{"@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png","datePublished":"2025-07-18T09:04:32+00:00","breadcrumb":{"@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#primaryimage","url":"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png","contentUrl":"https:\/\/cdn.prod.website-files.com\/67daf5363982915ea2ad8760\/6877993bc2316ffb96b50c2a_AD_4nXdu9BUvl0mded-QdI3hdi33xpG7eeRqqEYAoev1tnbIn4256Xp2YGrAQUC2WlR9WvNK5d_u6aOK40JpEPT38k7nI847ay28l5s4UYkme1E_N00R2uMyCstiszJEsCfBheO71zkc2g.png"},{"@type":"BreadcrumbList","@id":"https:\/\/segura.security\/post\/understanding-identity-threats-in-cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-toV","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/113021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=113021"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/113021\/revisions"}],"predecessor-version":[{"id":113025,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/113021\/revisions\/113025"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=113021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=113021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=113021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}