Lateral Movement in the Real World: A Quantitative Analysis

Lateral Movement in the Real World: A Quantitative Analysis

Lateral movement is also often overlooked because most security tools focus on the perimeter of the network, and they seldom look at the interactions among internal hosts, and, as a result, these tools might miss important aspects of a multi-step attack.

View this article to learn more about:

  • Understanding intrusions and lateral movement;
  • 5 techniques used by attackers;
  • Why lateral movement is overlooked.

VMware and Intel transform networking and security leveraging integrated solutions across software and hardware to connect and secure applications and data wherever they reside. From data center to cloud to edge.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.