Priyanka Aash

How You Can Effectively Run Cyber Drills with Red Teaming

Red Teaming & Continuous Automated Red Teaming (CART) For the past decade, there have been unprecedented cases of cyber-attacks that have resulted in the exposure of private information and other related damages. According to RiskBased, cyber-attacks exposed 4.1 billion records in the first six months of 2019; and Juniper Research estimates this number to rise… Read More »How You Can Effectively Run Cyber Drills with Red Teaming

CISO Platform Fireside Chat – Running A Cyber Security Drill For The US Government & Homeland Security

In our last Fireside chat episode with CISO Platform, a well-known author and cybersecurity professional, Dan Lohrmann, CSO and Chief Strategist at Security Mentor Inc, and Bikash Barai, Co-Founder of FireCompass, discussed a bunch of things on how to effectively run a cyber crisis drill with the US Government and tabletops for enterprise board members.… Read More »CISO Platform Fireside Chat – Running A Cyber Security Drill For The US Government & Homeland Security

Red Teaming: Why A Forward Offense Is The Best Defense

Cyber-attacks and data breaches have been the top threats to organizations for the past decade. According to studies, there is a cyber-attack every 39 seconds. Opportunistic cybercriminals scan the internet for vulnerable systems and motivated cybercriminals persistently scan a targeted organization for vulnerable entry points. And unless you continuously carry out a vulnerability assessment of… Read More »Red Teaming: Why A Forward Offense Is The Best Defense

Understanding The Attack Surface and How To Defend

We live in an era of constant cyber threats. According to  Verizon report 2020, there were over 157525 cyber breach incidents in 2020, 3950 of which were confirmed data breaches. Cyber breaches are harmful occurrences that result in damages to organizations’ financial, legal, and reputational status. Cybercriminals use unsecured endpoints to breach into networks, and… Read More »Understanding The Attack Surface and How To Defend