ARTICLE
The SpecterOps BloodHound Enterprise government solutions brief emphasizes the importance of managing identity attack paths to e...
READ MORE |
CASE STUDY
Assessing the effectiveness of endpoint and network security products is imperative to identifying and addressing the threats it...
READ MORE |
WHITEPAPER
The trust architecture of security products is a critical component in measuring their efficacy. Download and read this SpecterO...
READ MORE |
SOLUTIONS BRIEF
SpecterOps believes that training is an essential part of integrating a new security tool or capability into your network. Check...
READ MORE |
SOLUTIONS BRIEF
By adopting the mindset of a network adversary aimed at operating against an organization’s enterprise environment, Specte...
READ MORE |
REPORT
Remote procedure call (RPC) is used within networks for everyday functions that involve communication between programs. In this ...
READ MORE |
REPORT
Though widely adopted, Active Directory Certificate Services (AD CS) is often misunderstood and has the potential to result in d...
READ MORE |
SOLUTIONS BRIEF
Understanding how a network adversary might work to dismantle an organization’s enterprise environment is a critical compo...
READ MORE |
REPORT
Active Directory (AD) security descriptors hold secret pathways often unnoticed by both attackers and defenders. This SpecterOps...
READ MORE |
REPORT
When hunting for malicious behaviors in a network environment, it is important to ensure that already in-place defensive solutio...
READ MORE |