Methodology
Publications Based on Methodologies that Matter
Improving Security Through Validation Collaboration
We work with enterprises, governments, and security vendors to publish complementary security validation reports on vendor technologies.
We work with public and private organizations to help identify relevant areas of coverage, identify workflows, and validate scenarios
Our team also invites these organizations to provide feedback on our testing methodologies
Published results are shared as complementary individual reports and a comparative CyberRisk Readiness Quadrant
Individual test verification reports provide detailed validation of security against nation-state attacks, advanced attacks, results that map to NIST, MITRE ATT&CK frameworks, the Lockheed Martin Kill Chain, and highlight validated key vendor differentiators.
The Enterprise CyberRisk Ripple helps organizations understand ROSI (return on security investment) on operational and security levels.