Lateral movement is one of the most consequential types of network activity for which organizations need to be on the lookout. After accessing a network, the attacker maintains ongoing access by essentially stirring through the compromised environment and obtaining increased privileges (known as “escalation of privileges”) using various tools and techniques. Attackers then use those […]… Read More
The post File Integrity Monitoring (FIM): Your Friendly Network Detective Control appeared first on The State of Security.