Lateral Movement in the Real World: A Quantitative Analysis
Lateral movement is also often overlooked because most security tools focus on the perimeter of the network, and they seldom look at the interactions among internal hosts, and, as a result, these tools might miss important aspects of a multi-step attack.
View this article to learn more about:
- Understanding intrusions and lateral movement;
- 5 techniques used by attackers;
- Why lateral movement is overlooked.
VMware and Intel transform networking and security leveraging integrated solutions across software and hardware to connect and secure applications and data wherever they reside. From data center to cloud to edge.