Checklist for Reducing the Addressable Attack Surface Using ThreatPath
Written by: Vikram Navali, Senior Technical Product Manager – Over the last couple of months, the news has reported many cyberattacks, a dire warning for organizations to prepare or become victims of a breach. According to the Verizon Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involve brute force or the use of lost or stolen credentials. It is not altogether possible to prevent credentials from getting compromised. However, understanding the addressable attack surface and implementing security controls is a holistic approach that makes it difficult for an adversary to compromise one’s network.