Warning: The magic method MchGdbcBasePublicPlugin::__wakeup() must have public visibility in /home2/tectonic/public_html/www.abrahamsconsulting.com/blog/wp-content/plugins/goodbye-captcha/includes/plugin/MchGdbcBasePublicPlugin.php on line 44
August 25, 2015 - TechTonic Times

TechTonic Times

Security I Networking I Storage I IT Staffing I Managed Services

Lateral Movement in Your Network. Can you tell?

By  Keith Wilson   One of the most damaging assumptions an organization can make is to assume an attacker’s end goal is to compromise a network. The majority of threat actors are after your data, not just circumventing firewalls and access controls. If they gain access to your network but get found out before they can steal anything, the attack was most likely considered a failure. To assume you have lost the moment an attacker gains...