Using attack trees or graphs to understand potential attack scenarios and the "how-to" of an exploit.
A framework documenting tactics, techniques, and procedures (TTPs) for cybersecurity threats.
A technique used by attackers to use one compromised machine to attack others. Strategic Application
A feature in Microsoft Defender XDR that automatically acts to contain threats based on AI analysis.
Visualizing the sequence of steps (nodes and edges) an adversary might take, including entry points and lateral movement.
Identifying critical assets, mapping the attack surface, and discovering vulnerabilities.