
Privilege Escalation and the Cyber Kill Chain
Many of todays attacks can be explained from understanding privilege escalation and the cyber kill chain. Derived from a military model, the Cyber Kill Chain
Many of todays attacks can be explained from understanding privilege escalation and the cyber kill chain. Derived from a military model, the Cyber Kill Chain
Every day, cyberattacks and data breaches affect organizations around the world. Thousands of tools have been deviced to detect and mitigate these attacks. This is
Developed by the American Institute of Certified Public Accountants (AICPA), Service Organization Control (SOC) reports are independent reports designed to establish a framework for the system-level controls
Hackers get into our systems for data theft and other reasons. The Cyber Kill Chain identifies privilege escalation as a key step, right after exploitation and before
Managing user accounts is essential to maintaining the security and integrity of your company’s data. But what is an access review and how does it
Health was on everyone’s mind in 2020 – which means a lot of passing of medical records! The need for portability isn’t waning – so
In January of 2020, the US Department of Defense (DoD) released the highly anticipated Cybersecurity Maturity Model Certification (CMMC) to improve cybersecurity measures that contractors must have
NIST CSF 1.1 and User Access Reviews The National Institute of Standards and Technology (NIST) is a department of the United States government dedicated to
SOC 2 Type 2 , Internal Controls and Access Reviews Not to be confused by SOX (the Sarbanes-Oxley Act), SOC 2 is an auditing procedure