Browsed by
Author: Kevin Foisy

Hierarchical Analytics

Hierarchical Analytics

The Analytics Buzz It’s an exciting time! The IT security industry is buzzing with vendors talking analytics as the solution to a never ending cat-and-mouse game of “catch the bad guy.” The idea is that analytics puts a combination of the brains and horsepower in the box. Massive amounts of activity data coupled with super computing power has the potential to detect and highlight anomalies. And these anomalies will supposedly illuminate the bad guy like a spotlight in a prison…

Read More Read More

What is a Pass the Hash Attack and How to Defend Against it

What is a Pass the Hash Attack and How to Defend Against it

There’s been a lot of talk recently about the “Pass the hash” and “Pass the ticket” threats. In this blog post, I’ll talk a bit about what these threats are, how real they are, and what you can do to protect yourself. So first, what is it? These are two variations of the same threat. Pass the Hash and Pass the Ticket both work by impersonating a user on the network and spread to other systems by leveraging cached credentials….

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.