Dark Mode

    Free Trial
    Image of Evyatar Beni
    • 2 min read
    • May 22, 2024 7:15:00 AM

    Lateral Movement is the Key Issue

    Lateral Movement - securing laterally

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something slip by. I worry most about where we have some looming configuration issues. That’s what a hacker will use to attack us...

    We need to realize that if we don’t address the basics, and do so very well, we won’t have addressed the major problem. That’s what has been eating everyone’s lunch lately.

    We can’t just watch more webinars about hacker tactics, we need to actually be hands-on keyboard combatting the low hanging fruit issues that a configuration problem presents.”

    —CISO of a large enterprise who spoke to us on condition of anonymity

    Lateral Movement is the Key Issue

    It proactively planning defense, it can be helpful to imagine yourself on the back foot after an attack. Ask yourself, “What is the one thing you must have to continue to own the system?” 

    The answer is usually the same: sufficient hygiene within and across network segments that a breach can be isolated and quarantined. The fact is that without strong hygiene, regardless of the way in, once there it's very easy for an attacker to move and maneuver through systems across infrastructure.

    It's hard to hit a moving target and it's even harden to assert ownership over a system with an adversary freely worming through it. 

    Aiming for ASAP ASAP

    GYTPOL eliminates misconfigurations that undermine device and network hardening efforts. The system is designed to get ahead of the issues most commonly exploited by hackers.

    Proof positive of these facts can be seen in attack vectors that were detected and locked down by GYTPOL before coming into wider public awareness. These include:

    • Supply Chain attacks including SolarWinds and Keysea
    • Petit Potam (NTLM)
    • Print Nightmare
    • Microsoft Exchange

    These are just a few examples of what we're able to achieve more with our "think like a hacker" mentality. Configuration and the power that a well built and safely set up system offers are necessary for any organization to digitally transform.

    There will always be threats, but GYTPOL is uniquely positioned to keep you ASAP ASAP — as secure as possible, as soon as possible!

    About Author

    Image of Evyatar Beni

    Evyatar Beni

    A proven leader, Evyatar brings over a decade of experience in Customer Success & Cyber Strategy. Previously, Evyatar led Technical Account Managers at Claroty; before which he filled several distinguished tech roles in the Intelligence Services.

    Comments