lateral movement
Seven Common Lateral Movement Techniques
Nik Hewitt | | advice, Best Practices, lateral movement, next gen security, security, Security Research
Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive ...
How Ransomware Spreads and How Microsegmentation Stops It
Bruce Lynch | | advice, Best Practices, lateral movement, microsegmentation, next gen security, Ransomware, security, Security Research, zero trust
Ransomware impacts more than seven in ten companies worldwide, and understanding how ransomware spreads is critical to finding solutions to stop it Ransomware is malicious software threat actors use to infiltrate a ...
What is a Customer Experience Reference Architecture?
Bruce Lynch | | advice, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, Security Research, TrueFort, zero trust
Creating and deploying a customer experience reference architecture is tricky, but microsegmentation can drastically increase the chances of success Customer experience reference architecture is the structured framework or model that provides guidance ...
The Strategic Advantage of a Multi-Layered Cybersecurity Approach
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, network segmentation, next gen security, security, Security Research, zero trust
Adopting a multi-layered cybersecurity strategy has become an imperative like never before As we all know, cybersecurity threats are becoming more sophisticated and pervasive, posing an immense challenge to businesses. Now, more ...
How to Detect Lateral Movement and Three Ways to Prevent It
Bruce Lynch | | advice, anlaysis, Cybersecurity, lateral movement, microsegmentation, security, Security Research, service account protection, service accounts, TrueFort, zero trust
Learn what you can do to detect lateral movement and prevent lateral movement attack After gaining access to an organization’s network, cybercriminals use lateral movement to escalate privileges, exploit vulnerabilities, and other ...
Achieving Zero Trust Network, Application, and Cloud Security with Linux
Nik Hewitt | | application protection, Best Practices, Cloud, lateral movement, Linux, microsegmentation, next gen security, security, Security Research, zero trust
How can organizations achieve zero trust best practices when using a Linux environment? As so many organizations increasingly adopt zero trust security models to protect their networks, applications, and cloud environments, Linux ...
Why Insider Risk Cybersecurity Should be a Major Concern
Nik Hewitt | | Best Practices, Cybersecurity, insider threat, lateral movement, malicious insiders, security, Security Research, zero trust
Why every organization should be concerned about insider risk cybersecurity and what we can do about it The importance of securing an organization against cyber threats has never been more critical. However, ...
Ensuring a Seamless and Secure Cloud Transformation
Nik Hewitt | | advice, application protection, Best Practices, Cloud, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
A holistic guide for CISOs and CTOs in guaranteeing and smooth and secure cloud transformation As cloud computing continues to dominate digital transformation – and justifiably so – organizations face a dual ...
Health Insurance Portability and Accountability Act (HIPAA) Best Practices
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, security, Security Research, Supply Chain Attacks, visibility, zero trust
Highlighting the key elements of The Health Insurance Portability and Accountability Act to ensure HIPAA best practices The Health Insurance Portability and Accountability Act (HIPAA) is a vital piece of legislation that ...
Demystifying Microsegmentation vs. Network Segmentation
ninikhew | | advice, application protection, Best Practices, lateral movement, microsegmentation, next gen security, security, service account protection, Uncategorized, zero trust
Understanding the distinctions and benefits of microsegmentation and network segmentation and making the right choice I’m probably asked at least once a week about the difference between microsegmentation and network segmentation. Writing ...