Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Growing Cybercrime Sophistication Inspires New Security Strategies

Coalfire’s New Threat Modeling and Attack Simulation Approach Is Designed to Maximize Security Investments

Coalfire, a provider of cybersecurity advisory and assessment services, introduced its proprietary Threat Modeling and Attack Simulation (TMAS) methodology designed to help organizations validate their own security effectiveness, guide contingency strategies, and justify overall security operations.

“The threat landscape is becoming more sophisticated, and security professionals have to look beyond the expected,” said Mike Weber, Vice President, Coalfire Labs. “With our new TMAS approach, Coalfire brings our clients a unique methodology to plan for the unexpected, optimize security systems and workflows, and to establish a baseline command of security operations toolsets.”

Recommended AI News: 10 Tech Companies Donates Over $1.4bn to Fight Coronavirus

The Coalfire TMAS engagement incorporates the use of purple team simulations to represent both attacker and defender postures, customized according to each client’s priorities. In addition, the Coalfire Labs TMAS team identifies low-priority, overlooked, and unexpected threat vectors with the following approach:

Related Posts
1 of 40,574
  • Evaluate the risk management strategy to determine how the organization has prioritized security investments
  • Identify threat actors and threat vectors that could leave the organization vulnerable based on the prioritization of risks
  • Develop attack simulations based on the application of the MITRE ATT&CK framework and the organization’s threat model
  • Execute attacks, identify security program strengths and weaknesses, and use these to enhance the threat model and inform future attack simulations

An example set of attack scenario categories derived from threat modeling includes:

  • Insider threat access to sensitive data
  • Compromised customer account used to attack application interfaces
  • Supply chain / software dependency compromise
  • “Malware-infected” workstations controlled by an attack on the internal network
  • Spear-phishing attacks, targeting high-profile individuals
  • Physical attacks to breach the perimeter and gain access to the network

Recommended AI News: AiThority Interview with Josh Poduska, Chief Data Scientist at Domino Data Lab

“Our testers can carry out any attack vector against any organization by physical access, social engineering, technical attacks, or non-traditional IoT solutions,” said Weber. “Coalfire’s TMAS engagements are designed to build a threat model unique to each business, and to complement additional initiatives such as vulnerability assessments and defensive diagnostics.”

Recommended AI News: Tech Taking Over Our Lives: Smart Phones and the Internet of Things (IoT)

Comments are closed, but trackbacks and pingbacks are open.