Archive

Archive

What is Breach and Attack Simulation from Cymulate?

Written by: Mike Talon One of our site visitors asked a pretty popular question recently: “What, exactly, is Breach and Attack Simulation (BAS)?” Let’s dive in and have a look at this form of security control testing. So, what are ... »

Let’s Get Offensive – The Pros and Cons of Diverse Security Testing Methods

Most IT teams only know if they are protected against a cyber attack when one actually occurs. Organizations spend considerable resources to ensure that they have the best defenses in place. Yet the only way to ascertain those tools’ effectiveness ... »