CyberWire Daily cover image

“Shift Left”: A case for threat-informed pentesting. [CyberWire-X]

CyberWire Daily

00:00

Using Threatened Form Pen Testing

Miter attack framework is a great place to start or from the whole off top 10 are great places to start just from like an idea of like these are the common techniques and tactics that attackers are using. Having a capability of tracking how you're how you're doing and getting better really starts to show the progress that you're making, Rick Howard says.

Play episode from 23:14
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app