Close security gaps with attack path analysis and management

0
444

Today’s IT systems spread far and wide. They connect myriad devices and applications — both in the cloud and on premises — to serve users around the world.

Systems are complex and dynamic with constantly changing resources and permissions, resulting in an ever-shifting environment that security teams scramble to keep secure. Traditional cybersecurity approaches — identity and access management (IAM), vulnerability scanning and patching — tend to focus on only one aspect of security, but often, these techniques can’t adequately reveal the cumulative effects of vulnerabilities that an attacker could exploit.

Enter attack path analysis, a visual depiction that enables security teams to understand the interrelated and dynamic steps an attacker could take to enter and navigate through an organization’s network.

What is attack path analysis and why is it important?

Traditional security controls, including the aforementioned IAM, vulnerability scanning and patching, play an important role in cybersecurity. Tackling each of them individually and reviewing one risk point at a time, however, don’t give an accurate view of attackers’ potential trajectories through a network.

Other security…

Подробнее…

Актуальные книги на английском