Tenable to highlight Active Directory security capabilities at GISEC 2021

Successful cyber breaches typically start by exploiting a known vulnerability followed by attacks on Active Directory to escalate privileges, move laterally, install malware and exfiltrate data affecting IT systems and operational technology.

ThreatQuotient-sponsored survey reveals impact of COVID

The survey, sponsored by ThreatQuotient, explores the state of play in the global use of CTI and outlines why the difficulties of the past year have contributed to the continued growth and maturity of CTI.