Navigating the Uncharted: A Framework for Attack Path Discovery

Navigating the Uncharted: A Framework for Attack Path Discovery

This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, ...
The Security Principle Every Attacker Needs to Follow

The Security Principle Every Attacker Needs to Follow

Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics: Red Team Operations course. The new course needed to cover the advanced tradecraft we perform on ...
Attack Path Analysis GIF

Demystifying Attack Path Analysis in Application Security: Benefits, Implementation, and Considerations

The term “attack path” often brings to mind memories of my time as Chief Marketing Officer for a breach simulation firm, where I learned of adversaries’ tactics commonly seen in traditional security ...
Attack Path Reachability Analysis in the OX Active ASPM Platform

Unlocking a New Era in Application Security with OX Security’s Attack Path Reachability Analysis

Proactive application security is not only essential; it’s needed urgently.  One need look no farther than the staggering 742% growth in software supply chain attacks between 2019 and 2022 to understand that ...

Press Release: Optimizing Application Security with OX Security’s Attack Path Reachability Analysis

New Features Empower Organizations to Mitigate Risks in Software Supply Chains.   RSA CONFERENCE, SAN FRANCISCO — May 7, 2024 — OX Security, a leader in Active Application Security Posture Management (ASPM) ...
Orca Security attack path Ukraine

Orca Security Adds Attack Path Analysis to Cloud Security Platform

Orca Security this week added attack path analysis capabilities to its cloud security platform as part of an effort to make it easier to identify weaknesses that cybercriminals might exploit, including threats ...
Security Boulevard

Application Security Check Up