
“Shift Left”: A case for threat-informed pentesting. [CyberWire-X]
CyberWire Daily
00:00
Using Threatened Form Pen Testing
Miter attack framework is a great place to start or from the whole off top 10 are great places to start just from like an idea of like these are the common techniques and tactics that attackers are using. Having a capability of tracking how you're how you're doing and getting better really starts to show the progress that you're making, Rick Howard says.
Play episode from 23:14
Transcript


