Skip navigation

A user acting with malicious intent to gain access to and compromise an information system.


Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.