LATERAL MOVEMENT: HOW TO BLOCK IT
When thinking about network lateral movement, it’s best to visualize it as an attacker traversing through a network and hunting for the most valuable items to be found.
WHY IT HYGIENE BECOMES KEY TO PROTECTING YOUR CRITICAL ASSETS
Even the most sophisticated adversaries are using surprisingly unsophisticated means to wreak havoc, meaning that zero-days are being employed less frequently.
WHY IS IT SO EASY FOR APTs TO MOVE THROUGH OUR NETWORKS?
despite all the awareness, technology advancements and heavy investment, the fight against advanced persistent threats (APTs) remains a losing battle.
AUTOMATING THE PURPLE TEAM IN THE FACE OF APTs
he purple team enables both attack and defense to exchange ideas, observations and insights more productively than is possible with the “us vs. them” ethos of the red/blue battles.
HOW ADVANCED PERSISTENT THREATS WORK
Actors behind APTs create a growing and changing risk to organizations’ financial assets, intellectual property, and reputation by following a continuous process or kill chain
SIMULATING ATTACKS TO SECURE BANKS: TO PROTECT YOUR GREEN, GO PURPLE
Although finance isn’t the industry that’s most often attacked, the cost per attack is much higher than in other sectors.
7 TOP CHALLENGES FOR CHIEF INFORMATION SECURITY OFFICERS IN 2020
Many of the security methods and techniques that have been effective in the past will no longer be helpful to protect your most critical assets.