Breach & Attack Simulation in Your SOC

Reading Time: 3 minutesStatus: Final Blueprint (Condensed) Author: Shahab Al Yamin Chawdhury Organization: Principal Architect & Consultant Group Research Date: January 6, 2022 Location: Dhaka, Bangladesh Version: 1.0 (Summary) Executive Summary In a landscape of relentless cyber threats, traditional, point-in-time security assessments are Read More …

Automated Security Vulnerability Assessment – Application Platform, Networked Devices, IT, Cloud, OT/ICS

Reading Time: 4 minutesASVA is the systematic and continuous process of identifying, analyzing, and reporting security weaknesses with minimal human intervention.