News

Should I invest in attack simulation tools?

Breach and attack simulation, or BAS, tools help security administrators understand what their infrastructure looks like from an external perspective. Automated attack simulation tools are used to mimic the behavior of someone attempting to break into an organization for malicious purposes. The details of breach attempts are closely monitored, and successful attacks indicate where breach prevention measures should be bolstered.

In the past, enterprise organizations would pay an outside contractor to run penetration tests (pen tests) using various simulation attack tools. Enterprises did this to avoid the bias inherent in having security admins oversee a test that examined tools and breach prevention mechanisms they themselves might have implemented.

Fortifying existing security mechanisms

Yet, this was when pen testing tools were largely manual in nature. Modern attack simulation tools, on the other hand, are highly automated. Thus, there is no bias to be concerned with. Additionally, many companies find it’s preferable to run continuous attack simulations rather than conduct simulations on an infrastructure only once or twice in any given year. As a result, companies are concluding it’s more cost-effective to invest in their own set of breach and attack simulation tools that can be operated by in-house IT security administrators.

Hiring third-party security consultants to run external pen tests against the network remains incredibly useful. Running these tests gives organizations additional feedback, since they use different tools than those underpinning BAS products. One shouldn’t assume that attack simulation tools will completely replace the need to hire a security company to run pen tests. Instead, BAS should be considered a process that supplements regularly scheduled third-party pen tests.

Articles You May Like

Reflections on Web Summit: Out of the frying pan, and out of the fire?
Benchmark, the storied venture firm, sees “traps” in today’s AI funding frenzy: “Don’t be Microsoft”
Sam Altman returns to OpenAI, Apple adopts RCS, and Binance’s CEO pleads guilty to charges
North Korean Hackers Amass $3bn in Cryptocurrency Heists
Telekopye’s tricks of the trade – Week in security with Tony Anscombe

Leave a Reply

Your email address will not be published. Required fields are marked *