The evolution of network computing environments – including the increased use of mobile, cloud, and virtual infrastructure – has created a continuous stream of new attack vectors for adversaries to prey on. This is the ever expanding security perimeter outside of your organization including privileges and vulnerabilities. Regardless of the tactics used, most breaches comprise some exploitation of software vulnerabilities, system configuration settings, or poor privileged hygiene.
However, despite widespread deployment ...