ResilientX's articles

Strengthening App Security Through Threat Modelling Techniques” is an approach involving the analysis of the app to determine the security threats and their subsequent mitigation within the software application. It begins by defining the application targets that the application is to guard, those being user data, intellectual property, or system functionality. Having assets listed, existing […]
It is key to create a well-structured third-party risk management system for an organization to alleviate problems that may be originated by third parties such as vendors and partners. Here are some strategies and best practices to effectively establish and maintain such a framework: Here are some strategies and best practices to effectively establish and […]
In the realm of cybersecurity, the process of Attack Surface Management (ASM) is greatly enhanced through automation, particularly in four pivotal steps: In the realm of cybersecurity, the process of Attack Surface Management (ASM) is greatly enhanced through automation, particularly in four pivotal steps:   Automated Asset Discovery: At the time of identification, scans of […]
OSSTMM, or Open Source Security Testing Methodology Manual, introduces two important concepts: RAVs (Actual Attacks and Vulnerabilities) and SAFE Metrics (Security Analysis and Evaluation Framework) These concepts are central to the way security testing and in the analysis.   RAVs, or Real Attacks and Vulnerabilities, represent the core of OSSTMM’s approach. Instead of relying solely […]
A network vulnerability is a weakness or fault in the security architecture of a laptop community that might be used by hostile actors to get unauthorized access, interfere with operations, or steal sensitive data. Understanding the concept of network vulnerability is crucial for organizations to effectively assess, evaluate, and manage potential threats to their community […]
Penetration testing, sometimes known as pen testing, is a proactive cybersecurity technique used to evaluate the security posture of networks, computer systems, or online applications. To find vulnerabilities that malevolent actors might want to take advantage of, it entails modeling real-world intrusions. Penetration testing often employs a methodical technique that includes many critical stages. The […]
An essential component of Attack Surface Management, a proactive cybersecurity strategy, is Attack Surface Analysis and Monitoring (ASAM). Its goal is to systematically discover, evaluate, and mitigate possible threats and vulnerabilities to an organization's digital environment.   To find possible points of entry for cyber threats, ASAM thoroughly examines a company's digital infrastructure, including networks, […]