Attacker Behavior Industry Report, 1Q 2017
SOC workload reduction of 29X
In a 90-day period
Attackers can use your admin tools to spy, spread, and steal
In my last blog, I spoke about a financial customer performing pen testing and how I helped the blue team detect the red team as it carried-out an attack. I’m back again today with another story from the trenches.
This time, I’ve been working with a customer in the manufacturing sector who recently deployed me. As before, this customer prefers to remain anonymous to keep cybercriminals in the dark about their newly developed security capabilities. To stay on top of their game, they routinely run red team exercises.
Vectra in the news