Wavy Abstract Background

About BreachRisk™

How we not only find and test cyber risks, but communicate them in a way anyone can understand.

Risk Chart for website with lines_edited

BreachRisk™ Methodolgy

We follow the same process an attacker will to measure your cyber risk, but in a way that is safe & controllable.

1

Discover Attack Surface.  Use attacker tradecraft to find an organization's public infrastructure.

5

Business Agile Project Management Infographic Graph.png

Score.  Assign a BreachRisk™ Score based on threat vectors and testing results and provide recommendations.

2

Analyze.  Find active hosts, services and evaluate their weaknesses.

4

Test.  If authorized, conduct active penetration testing of discovered vectors to determine the level of risk they pose.

3

Identify Threat Vectors.  Find  opportunities in the attack surface that could be exploited & cause a breach.

BreachRisk™ Score

Clear, fair characterization of cyber risk, based on the ways an attacker can cause a breach.

4.5_Dial_Only.png

Simple

A number between 0 and 10 that communicates the relative risk of a breach, without bogging you down with the technical details.

Proven

BreachRisk™ Score is calculated by the likelihood and impact of a breach - a formula core to the practice of risk management.

CVSS Compatible

BreachRisk™ Score follows the Common Vulnerability Scoring System (CVSS) methodology and extends it to include threats that aren't reliant on vulnerabilities.

Questions?

Let our team reach out to you with answers or a demo.