Insights

Threat Modeling

Threat modeling Threat Modeling is a practice to proactively analyze the cyber security posture of a system or system of systems. It can be argued that Threat Modeling, when done well, can be the most effective way of managing and improving your cyber security posture.   What is threat modeling?   What are the business values?   Who …

Threat Modeling Read More »

SCADA Reference Architecture​

SCADA Reference Architecture In essence, a SCADA (Supervisory Control And Data Acquisition) solution is a set of systems for controlling distributed physical equipment. Operators control and monitor the physical processes via the centralized system which in turn is communicating with more local systems until the physical equipment is reached. Share on facebook Facebook Share on …

SCADA Reference Architecture​ Read More »

Egg or an onion

Egg Or An Onion? Do you have an, obviously very solid maybe you’d even say foolproof, perimeter and trust everything on the inside? Then you’re an egg. Once the attacker cracks the hard shell everything is up for grabs?Or do you have a, maybe not quite so foolproof, perimeter on the outside but inside of …

Egg or an onion Read More »

How securiCAD Enterprise works

Automate your cyber threat modeling & risk assessments​

Automate your Cyber Security​ – with Threat modeling & Risk assessments​ Threat modeling and IT risk assessment is known to be time consuming and difficult. This includes both the process of gathering information for the models and the actual assessment of risks. With securiCAD you can automate both activities by utilizing data you already have …

Automate your cyber threat modeling & risk assessments​ Read More »

Finding the golden eggs​

Finding the golden eggs​ The perimeter, just like the city walls of past centuries, is all but gone. Proliferation of Internet of Things-devices and cheap SaaS-solutions that can be bought by anyone with a credit card has decreased the little control the CIOs had on their perimeter security to a point where “zero trust” has …

Finding the golden eggs​ Read More »

New securiCAD Vanguard functionality: Use the Vanguard SDK for continuous attack simulations and automated threat modeling for your AWS environment

Vanguard SDK With a few lines of Python code and standard AWS libraries, you are now able to continuously simulate attacks on a virtual model of your AWS environment. This is an easy way to find security flaws, weak spots and misconfigurations in your AWS environment. You and your team can prioritize mitigation, actions and …

New securiCAD Vanguard functionality: Use the Vanguard SDK for continuous attack simulations and automated threat modeling for your AWS environment Read More »

Capability PROFESSIONAL VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

Capability VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

WEBINAR NOVEMBER 19TH 17:00-18:30 CET

Automate Cyber Security in Cloud and DevOps Environments

We warmly welcome You to this webinar where our experts present leading security trends in using open-source software, hacker-powered knowledge, and attack simulations – automated in your pipelines!

detectify_outlined_logo_RBG
cropped-Debricked_LogoTransparentwhite (1)