Interactive Demo: View BreachRisk™ Advanced Hacker Threat Analysis for an Entity
1. From the Home page, navigate to The Cyber Questionnaire Validator.
2. Double click to select an entity and view results.
3. The Hacker Threat Analysis is complete, so advanced insights are available when you scroll to the bottom of the page.
4. For advanced insights, show advanced hacker threat analysis for detailed BreachRisk™ AI findings.
5. You can also toggle Show Advanced Insights to display hacker insights by default.
6.
Review the Hacker's Plan of Attack for risk breakdown by attack vector.
These are the attack pathways that real attackers are planning to use. Some are more dangerous than others...
7. Hackers compare entities and tend to attack those that are easier to attack with higher impact.
8. Hackers care most about attack pathways that are Verified, with evidence that the pathway is not blocked by defenses.
9.
Legacy cyber tools often alert to "false positives."
A false positive is an observation that a regular defender would assume is a valid problem, but where a hacker knows that it can't be used to launch an attack. Perhaps because a security control is successfully defending it.
We show you these false positives and mark them, "Verified False" so that you know it should not be considered into your decision.
