FAQs

Complete the form below to get started.

What is lateral movement in cybersecurity?
How quickly can attackers begin lateral movement?
What are examples of lateral movement techniques?
Why is lateral movement so hard to detect?
What makes lateral movement so dangerous?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all

The User Is Still the Weakest Link - Now What?

Dune Security CEO David DellaPelle joins Secure Insights to break down why user risk drives breaches, how AI is accelerating social engineering, and why legacy awareness models are no longer effective.

Featured Podcasts
Graphic announcing a new partnership between Dune Security and OmegaBlack with company logos on a dark green background

Dune Security and OmegaBlack Partner to Deliver Intelligence-Driven Protection for the User Layer

Threat actors are building their campaigns across the dark web long before they reach the enterprise. Dune Security and OmegaBlack are partnering to deliver layered protection that connects external exposure with user level risk scoring and automated remediation.

Blog
Business Process Outsourcing support agent using a headset in a modern office at night, illustrating user cyber risk in outsourced operations.

How Attackers Exploit Trusted Access in BPO Environments

Learn why BPO environments are increasingly targeted by social engineering and how user cyber risk spreads across outsourced operations and client organizations.

Blog

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.