New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research

Search

Abnormal Behavior Detection in the Enterprise

The shifting tactics of the attackers are troublesome for most companies due to the nature of how the attacks work and the inability to change dynamically with the attack vectors. Traditional technology such as antivirus, Intrusion Prevention Systems and firewalls are a base level of security when it comes to defending against what most attackers focus on.

In this whitepaper, Binary Defense CTO and co-founder David Kennedy describes baselining an organization through the concept of “known good” or allow-listing and detecting abnormal behavior that deviates from the established norms.

About the Author

Dave Kennedy, Founder and Chief Technology Officer of Binary Defense

Founder and Chief Technology Officer of Binary Defense, Dave Kennedy, created Binary Defense to transform the security industry for the better. Dave co-founded the Penetration Testing Execution Standard (PTES) and has integrated this methodical approach into Binary Defense’s technology.

Simply put: Dave is one of the world’s leading security experts. With Dave at the helm and top-notch, well-seasoned security hunters filling out our ranks, it’s no wonder you’ll gain a wealth of institutional knowledge and a true ally.