Microsegmentation Needs to Isolate all Lateral Movement – Including Service Account Abuse
The devastating part of a cyber attack is when it reaches application environments with sensitive data to steal or encrypt. While microsegmentation is recognized as the best way to minimize the spread of the initial compromise, it cannot truly isolate…