Identity Threat Defense: Protect the Latest Perimeter Exploited by Cybercriminals
A Navigator whitepaper by Proofpoint
Threat actors are increasingly launching identity-based attacks to masquerade as legitimate users and target valuable healthcare IT resources. Many are going undetected until it is too late and the damage has already been done.
Introduction
Identity is not only the new perimeter to protect, but it is also becoming the new vulnerability that threat actors exploit to gain access to healthcare IT systems. Historically, security focused on blocking threat actors using technologies such as identity and access management (IAM) tools that provide single sign-on, multifactor authentication, and role-based access. Fast-forward to today. Cybercriminals are using sophisticated social engineering, phishing, smishing, and other exploits to steal credentials, which makes adopting identity threat defense (ITD) technology an imperative to make it harder for cybercriminals every step of the way should they breach the identity perimeter.
- Related Resources & News
- A CISO’s Playbook Vol. 2 – 0Auth Token Vulnerability That Caused Salesforce Breach
- Monthly Newsletter – May 2026
- Quarterly Threat Insights – Q1 2026
- What the Stryker Attack Reveals About Medical Device Security
- Policies and Safeguards for the Safe Use of AI
- HSCC Unveils 3rd-Party AI Risk & Supply Chain Transparency Guide
- Anthropic Unveils Magical 0-Day Computer God
- Healthcare in the Crosshairs: Iran-Linked Cyber Threats Raise Risk for Hospitals, MedTech, and Care Delivery Supply Chains
- Health-ISAC flags gaps in cyber resilience and incident response…
- Health-ISAC Hacking Healthcare 4-14-2026