Continuously mapping and testing all organizational assets for vulnerabilities.
A technique used by attackers to use one compromised machine to attack others. Strategic Application
A framework documenting tactics, techniques, and procedures (TTPs) for cybersecurity threats.
Visualizing the sequence of steps (nodes and edges) an adversary might take, including entry points and lateral movement.
Building an Attack Tree for Analysis of Information Security Risks
A tool that analyzes attack paths to identify exploitable entry points and critical assets.
Developing countermeasures to break the attack chain. Key Concepts and Tools