Hack the Hackers: 6 Laws for Staying Ahead of the Attackers
Summary
The article discusses a new security framework designed to counteract evolving tactics used by attackers who can infiltrate enterprises quietly by exploiting their own policies. This shift in tactics highlights the need for organizations to adapt their security measures to prevent such silent breaches.
Original Article Summary
A new security framework responds to a shift in attackers' tactics, one that allows them to infiltrate enterprises "silently" through their own policies.
Impact
Not specified
In the Wild
Unknown
Timeline
Newly disclosed
Remediation
Not specified