身分讓生態體系產生破口
Printnightmare, ZeroLogon, PetitPotam…what do they have in common? Right, Active Directory exploited.
Tenable’s Identity threat research team has developed a very complete retrospective report “Identity has breached the ecosystem” explaining the tactics that are used to attack Active Directory and how they have evolved.
Learn about:
- AD vulnerabilities that are routinely exploited
- Ransomware attacks
- The common tools used by attackers to discover AD assets
- The modus operandi of Threat Actor groups
…But most importantly, you’ll learn how you can limit your exposure.
- Tenable Identity Exposure
Tenable One
申請示範
以 AI 技術為後盾的全球領先曝險管理平台。
感謝您
感謝您對 Tenable One 有興趣。
我們的人員將盡快與您聯絡。
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success