At Randori, we recommend assessing risk by evaluating your network the same way an attacker would. But, what does that actually mean, and how does an attacker lens differ from a traditional defenders’ approach?
Today we’re thrilled to officially announce general availability of Randori Recon, the first phase of our automated attack platform. With only an email, Randori Recon can stack rank your most tempting targets for an adversary.
Data has become the basis of all decision-making processes, whether it be a business or a security decision. When building an attack-focused scraper, one must be prepared for dealing with extra levels of complexity in remaining invisible to defender’s eyes.
I am pleased to announce the release of a new Solutions Showcase from Enterprise Strategy Group (ESG) on the Randori Attack Platform.
There is nothing trendier in infosec today then to describe anyone under the sun showing any degree of competence as “advanced” or “sophisticated.” It’s an epidemic.
In cybersecurity, there is no such thing as perfection. If perfection is your goal, you are doing it wrong.
When the Shadow Brokers leaked nation-state level hacking tools in April of 2017, I immediately began digging into the post-exploitation capabilities and tradecraft of the supposed “APT” group.
Security cannot exist in a vacuum. If an organization’s security is dictated from one room, one group of people, the value of shared responsibility is lost.
I love to ask tech start-up founders what it was that prompted formation of their business. I’m usually listening to see if they are driven by some deeply-held personal belief (good answer) or by some greedy, near-term revenue growth objective (bad answer).