Successful cyber breaches typically start by exploiting a known vulnerability followed by attacks on Active Directory to escalate privileges, move laterally, install malware and exfiltrate data affecting IT systems and operational technology.
The survey, sponsored by ThreatQuotient, explores the state of play in the global use of CTI and outlines why the difficulties of the past year have contributed to the continued growth and maturity of CTI.