How to Prevent Phishing Attacks and Malware that Uses Out-of-Hierarchy Process Launches
In this video, James Maude, BeyondTrust’s Lead Cyber Researcher, demonstrates how to prevent an attack that uses out-of-hierarchy process launches with an implementation of BeyondTrust Privilege Management’s Trusted Application Protection and Advanced Parent Tracking features.