Lateral movement is one of the most consequential types of network activity for which organizations need to be on the lookout. After accessing a network, the attacker maintains ongoing access by essentially stirring through the compromised environment and obtaining increased privileges (known as “escalation of privileges”) using various tools and techniques. Attackers then use those […]… Read More

The post File Integrity Monitoring (FIM): Your Friendly Network Detective Control appeared first on The State of Security.

Have you ever been around someone who is just better at something than you are? Like when you were in grade school and there was this person who was effortless at doing things correctly, like getting high grades? They had great study habits, they arrived on time, they were prepared and confident in the materials […]… Read More

The post The Four Stages to a Successful Vulnerability Management Program appeared first on The State of Security.