Archive

What is privilege escalation and why should you care?


A common hacking method is to steal information by first gaining lower-level access to your network. This can happen in a variety of ways: through a print server, via a phished email, or taking advantage of a remote control program with poor security. Once inside, the hacker will escalate their access rights until they find minimally protected administrative accounts.

Monitoring DNS Traffic for Security Threats


Cyber criminals are constantly developing increasingly sophisticated and dangerous malware programs. Statistics for the first quarter of 2016 compared to 2015 shows that malware attacks have quadrupled.

See EventTracker in action!

See EventTracker in action!

Join our next live demo July 2nd at 2:00pm EST.

Register Here