Opens profile photo
Follow
SafeBreach
@safebreach
SafeBreach simulates hacker breach methods to quantify risks and validate how well your security controls can stand up to a breach. Funded by
USA and Israelsafebreach.comJoined March 2015

SafeBreach’s Tweets

Today we celebrate all those who have served and are still serving. Let's show our service men and women our appreciation with a virtual round of applause! To join us, reply to this tweet with an applause emoji 👏 . #VeteransDay #thankyou
Image
In case you missed it, check out this episode of The Modern Security Architecture from Cybercrime Magazine. SafeBreach CISO Avishai Avivi joins host Zack Hack to discuss his data-driven approach to being a CISO and more. ow.ly/ihuX50Lv3Sn
Image
“Just because we have implemented a tool doesn’t mean we’re safe,” says one Fortune 500 biopharmaceutical CISO. Read our case study to learn how they implemented SafeBreach to contend with rampant security tool proliferation across his organization. ow.ly/WSEy50LwxeG
Image
Regardless of how well zero trust is implemented, there still needs to be an automated, ongoing validation component. Check out our latest blog to learn how Zscaler and SafeBreach have joined forces to simplify and optimize security posture management.
In case you missed it, SafeBreach was named a 2022 CISO Choice Awards winner in the breach and attack simulation (BAS) category. Congrats to all the winners, and thank you to the panel of distinguished CISO judges who selected SafeBreach for this honor.
At last, one of the most buzzed-about talks from this year’s DEF CON 30 is now available for your viewing pleasure. SafeBreach Director of Security Research Tomer Bar captivated the crowd with a presentation of his APT group research and findings.
Breach and attack simulation (BAS) enables security teams to quickly and flexibly share their control validation findings and metrics with stakeholders. Check out the latest edition of BAS 101 to learn about the reporting capabilities BAS can provide.
Don’t panic, but National Cybersecurity Awareness Month ends today—on Halloween! We must beware of the ghoulish threat groups and ghastly attacks that go bump in the network, so let’s keep the awareness train going with this article from CISOMAG.
It’s day 2! Let’s talk cyber. 💻
Quote Tweet
Segundo y último día en el Congreso de Prevención del Fraude y Seguridad de @Asobancaria en #Barranquilla #Colombia Los esperamos en nuestro stand junto a nuestros amigos de @safebreach. #Infosec #Ciberseguridad
Image
Image
1
Stop by & come see us!
Quote Tweet
Los esperamos en nuestro stand durante el "Congreso de Prevención del Fraude y Seguridad" en #Barranquilla #Colombia de @Asobancaria Estaremos con nuestros amigos de @safebreach asesorando a las organizaciones más destacadas de la región en temas de #ciberseguridad
Image
1
US federal government agencies like DHS and CISA continue to push for cybersecurity teams to bolster their budgets and maturity. This includes implementing advanced validation technology like breach and attack simulation (BAS).
ServiceNow is a renowned innovation powerhouse, leading the way in cloud-based workflow automation. They’ve also invested in and partnered with SafeBreach. Check out our blog to learn why they believe in us and what we have in store for mutual clients.
Calling all cybersecurity professionals! What is the primary way your team communicates its security control validation results with key stakeholders in your organization?
  • Hold recurring meetings
    0%
  • Send regular reports
    0%
  • Stakeholders pull metrics
    0%
  • We dont share results
    0%
0 votesFinal results
The SafeBreach Hacker’s Playbook has been updated with coverage for the recently identified Prestige ransomware and Text4Shell vulnerability. Our customers can select and run these attacks to ensure protection against these advanced threats.
1