Lateral Movement Tag

In my recent eBook, The SOC Visibility Triad: Three Core Pillars for Network-Centric Threat Detection and Response, I discussed how Network Detection and Response (NDR) together with SIEM and Endpoint Detection and Response (EDR) improves threat detection and response. Gartner refers to this as a...

We have already shared three of the top five things customers tell us that they hate about their standalone IDPS: it floods the SOC with alerts, lacks visibility into lateral movement of threats inside the network and does not detect enough. Now, I’ll discuss the...

Lastline blogs are a great source of information on the latest cybersecurity trends and how to detect and contain threats before they disrupt your business. We always strive to offer interesting, educational content in our blog posts. And based on growing readership, a lot of people...

Freely available, public networks are a huge asset to the world, and they get plenty of use. One global supplier of software for public networks, Purple Wi-Fi, reports that almost half of us who carry a laptop, tablet, or smart phone, will connect to a...

Sophisticated attackers can find their way into a corporate network in many ways. An attack could come from an external source, through the exploitation of a service, or by being brought in by a user whose laptop has been infected while traveling. As the network infrastructure...