Filter By:

Recent Blogs & Podcasts

Back to Insights

Detect Attackers Pivoting in the Network

August 11, 2017 | Threat Detection and Hunt Teaming
By Joff Thyer, IANS Faculty

We all know attackers are likely already on our networks, but what are the best ways to flush them out as they pivot and try to exfiltrate critical data? In this Ask-an-Expert live interaction, IANS Faculty Joff Thyer details several key pivot detection strategies, including monitoring for specific processes and behavior on endpoints, and establishing honey tokens.

IANS

— CLIENT PORTAL —

 LOCKED CONTENT
Please Login to continue



Related Research

5/16/2017 | Ask-an-Expert
Building a Low-Interaction Honeypot on Linux


5/10/2017 | Blog
Van Wyk: Targeted Attacks Require Much Deeper Analysis


4/21/2017 | Ask-an-Expert
Pushing the Security Operations Center to the Next Level