Segment Technical Product Overview
When the history of cyber security is written—lateral movement will have THE leading role as the villain. In most cyberattacks—both in and not in the news—all have a basic and consistent plot. It starts with machine compromise, then onto recon, exploitation of a vulnerability and finally to lateral movement. All of these commonly used sequence of tactics rely on a basic attacker assumption: the compromised machine will have direct network line of sight to other machines that contain profitable data or IP to steal.
Read More