Quantifying Cyber Risk: The Art and Math of Attack Surface Scoring (Part 3)
In Part 2, I shared how I use OSSTMM and RAV to give each asset a risk score. It’s a solid way to get a sense of what’…
In Part 2, I shared how I use OSSTMM and RAV to give each asset a risk score. It’s a solid way to get a sense of what’…
In an age where information moves faster than bullets, Open-Source Intelligence (OSINT) has emerged as a vital pillar…
In Part 1, I shared how I approach cyber risk by looking at it through the lens of Attack Surface Scoring (ASS). Now i…
In an increasingly hostile cyber threat landscape, the concept of an Attack Surface has evolved from a vague notion t…
In today's digital landscape, data breaches have become an unfortunate norm, with threat actors continually evolv…
When it comes to OSINT (Open Source Intelligence) investigations, one of the biggest challenges is finding accurate in…
Lately, I have been diving deep into how Model Context Protocol (MCP) could change the way we handle OSINT workflows. …