Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

FakePenny Ransomware, Qilin Ransomware, and More: Hacker's Playbook Threat Coverage Round-up: June 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats.

The Road to CTEM, Part 2: The Role of Continuous Validation

Many acronyms and security concepts come and go without much traction, but the term continuous threat exposure management (CTEM) seems to be taking hold for the foreseeable future. CTEM, a term originally coined by Gartner, offers a cyclical approach to finding and mitigating threat exposure—which is the accessibility and exploitability of digital and physical assets—in an ongoing, proactive, and prioritized way.

Security Posture Drift: Tracking & Managing Security Posture Over Time

Given the high level of complexity in securing enterprise IT systems, it can be extremely difficult to keep track of changes in the organization’s overall security posture. It’s even more complicated to ensure that the dozens of security controls in place to protect the organization’s IT (and OT) assets are functioning properly and configured securely.