Skip to Content

Tag: Attack Simulation

New Year’s Cybersecurity Resolutions: 3 Changes You Can Make in 2023

As we approach the end of 2022, many of us will set out the usual New Year’s resolutions, good intentions, and goals we’d like to achieve in the next 12 months. While you ponder changes to diet, exercise, or education, take this fantastic opportunity to make some changes that will boost your company’s cyber risk […]

What Is Breach and Attack Simulation?

Breach and attack simulation is a way for organizations to test the efficacy of their security controls. This article will explore three common types of attack simulations and where these approaches can fall short. Common Attack Simulations Tabletop Exercises A tabletop exercise (TTX) simulates an actual crisis. It is a security incident preparedness activity that […]

New in GreyMatter: Industry-Leading Security Measurement and Security Controls Validation

Today we’re introducing a new set of capabilities in our GreyMatter Open XDR-as-a-Service platform that allow security leaders to track, act on, and communicate security metrics across their programs and enable operations teams to validate security controls to ensure preparedness and resiliency. These new features address some of the most critical challenges in security programs: […]

Top 3 Mistakes When Simulating Cyber Attacks

Breach and attack simulation (BAS) offers an efficient way to validate and test security controls, threat detection capabilities, logging levels in an environment, and incident response workflows. Simulating cyber attacks in this manner allows for security teams to proactively identify and remediate gaps; however, if not performed correctly, security teams may end up with a […]

5 Ways to Use Continuous Attack Simulations to Validate Your Security Controls

How confident are security teams that their controls will catch attacks when they arise? Ask around, and you might notice a theme: as enterprise security models grow in complexity, teams struggle to validate their security controls, increasing the likelihood of undetected breaches, gaps in protection, and weaknesses from unpatched systems. These scenarios are indeed worrisome, […]