attack path analysis
Navigating the Uncharted: A Framework for Attack Path Discovery
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, ...
The Security Principle Every Attacker Needs to Follow
Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics: Red Team Operations course. The new course needed to cover the advanced tradecraft we perform on ...
Demystifying Attack Path Analysis in Application Security: Benefits, Implementation, and Considerations
The term “attack path” often brings to mind memories of my time as Chief Marketing Officer for a breach simulation firm, where I learned of adversaries’ tactics commonly seen in traditional security ...
Unlocking a New Era in Application Security with OX Security’s Attack Path Reachability Analysis
Proactive application security is not only essential; it’s needed urgently. One need look no farther than the staggering 742% growth in software supply chain attacks between 2019 and 2022 to understand that ...
Press Release: Optimizing Application Security with OX Security’s Attack Path Reachability Analysis
New Features Empower Organizations to Mitigate Risks in Software Supply Chains. RSA CONFERENCE, SAN FRANCISCO — May 7, 2024 — OX Security, a leader in Active Application Security Posture Management (ASPM) ...
Orca Security Adds Attack Path Analysis to Cloud Security Platform
Orca Security this week added attack path analysis capabilities to its cloud security platform as part of an effort to make it easier to identify weaknesses that cybercriminals might exploit, including threats ...