{"id":1052,"date":"2021-11-24T20:20:15","date_gmt":"2021-11-24T20:20:15","guid":{"rendered":"http:\/\/www.cyberdna.com.au\/cyber-automation\/?page_id=1052"},"modified":"2021-12-03T16:19:31","modified_gmt":"2021-12-03T16:19:31","slug":"automated-threat-assessment","status":"publish","type":"page","link":"http:\/\/www.cyberdna.com.au\/cyber-automation\/automated-threat-assessment\/","title":{"rendered":"Automated Threat Assessment"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-hdgqnw-0209553661570c4f5c87fa2bba12ba81\">\n.avia-section.av-hdgqnw-0209553661570c4f5c87fa2bba12ba81 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/why-you-need-cyber-threat-intelligence.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-hdgqnw-0209553661570c4f5c87fa2bba12ba81 .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#474747;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-hdgqnw-0209553661570c4f5c87fa2bba12ba81 main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  av-minimum-height av-minimum-height-20  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='20'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link ' aria-hidden='true' data-av_icon='\ue877' data-av_iconfont='entypo-fontello'><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1052'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-f91jgc-52183d86efeac64677f79d2c3ffd5c06 av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-e5351o-8e6f70e32bd4f61ed070f7cc528222f7 av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-buk8vw-e8225ab5bcd45b396e012bb1434bcd8a\">\n#top .av-special-heading.av-buk8vw-e8225ab5bcd45b396e012bb1434bcd8a{\npadding-bottom:10px;\ncolor:#ffffff;\nfont-size:60px;\n}\n.av-special-heading.av-buk8vw-e8225ab5bcd45b396e012bb1434bcd8a .special-heading-inner-border{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-buk8vw-e8225ab5bcd45b396e012bb1434bcd8a av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Automated Threat Assessment<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-b6rju4-5115018346e8fcc14faeff5a252f9d89\">\n#top .hr.av-b6rju4-5115018346e8fcc14faeff5a252f9d89{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.hr.av-b6rju4-5115018346e8fcc14faeff5a252f9d89 .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-b6rju4-5115018346e8fcc14faeff5a252f9d89 hr-custom  avia-builder-el-4  el_after_av_heading  avia-builder-el-last  hr-center hr-icon-no '><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div class='flex_column av-99x75o-80fa39046ad73decceecce9e5b4c943e av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7tgp1o-1878171100f0a974561ea57c7de10af0\">\n.avia-section.av-7tgp1o-1878171100f0a974561ea57c7de10af0{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-7tgp1o-1878171100f0a974561ea57c7de10af0 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1052'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-5p1a4c-d335f26dfcb30eb7bc3eb9c88d633d5f av_one_fifth  avia-builder-el-7  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-fdfng-a3d8c601c34a5424f1d6e66b07d8249e av_three_fifth  avia-builder-el-8  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdz2pb9-ee83f46d17729e273608bc54f21ae4d6\">\n.av_textblock_section.av-kwdz2pb9-ee83f46d17729e273608bc54f21ae4d6 .avia_textblock{\ncolor:#3b4a73;\nfont-size:18px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwdz2pb9-ee83f46d17729e273608bc54f21ae4d6 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p style=\"text-align: center;\">Every day, new payloads and attacks show up in the wild, orchestrated by known and unknown hostile entities, and while security leaders would like a clear and validated answer to every threat, their security team is unable to research and operationalize threat intelligence fast enough and\/or are unable to test security control efficacy at a high enough pace.<\/p>\n<\/div><\/section><\/div><div class='flex_column av-30xhng-58cdd72f30bb9ca3436a09b6c20e4af4 av_one_fifth  avia-builder-el-10  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdz812j-d2398b2e45a5256c5702388434c09c88\">\n.avia-section.av-kwdz812j-d2398b2e45a5256c5702388434c09c88{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-kwdz812j-d2398b2e45a5256c5702388434c09c88 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1052'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-kwdz4cr6-d62ee58c4d1cc9fb1e66669a670cc5c0 sc-av_one_half av-equal-height-column-flextable'><div class='flex_column av-kwdz4cr6-d62ee58c4d1cc9fb1e66669a670cc5c0 av_one_half  avia-builder-el-12  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdz5zrx-3539427430d29eece5ad566dda1de06e\">\n.av_textblock_section.av-kwdz5zrx-3539427430d29eece5ad566dda1de06e .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwdz5zrx-3539427430d29eece5ad566dda1de06e '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p>Cumulate Immediate Threat Intelligence module replaces these manual processes by providing a prepackaged fully automated assessment of new threats, that are updated daily in the platform by Cumulate Labs researchers. The immediate threats test help organizations to prioritize remediation and security control optimization based on validated results.<\/p>\n<p>It also correlates the findings of EDR and SIEM to each attack in addition to the incident playbooks triggered in SOAR. The results of the assessments provide a clear answer to the risk they create. Do they exploit existing vulnerabilities that are present on endpoints in the network? And are security controls able to detect or block these threats?<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-kwdz7p85-134803ad0a0b4d6e3f6db583cbae7fae av_one_half  avia-builder-el-14  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwnovhbp-17fabd38ebe940480552c12862234133\">\n.avia-image-container.av-kwnovhbp-17fabd38ebe940480552c12862234133 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kwnovhbp-17fabd38ebe940480552c12862234133 av-styling- avia-align-center  avia-builder-el-15  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1061 avia-img-lazy-loading-not-1061 avia_image' src=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence.jpg\" alt='Cyber-Threat-Intelligence' title='Cyber-Threat-Intelligence'  height=\"873\" width=\"1920\"  itemprop=\"thumbnailUrl\" srcset=\"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence.jpg 1920w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-300x136.jpg 300w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-1030x468.jpg 1030w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-768x349.jpg 768w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-1536x698.jpg 1536w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-2048x931.jpg 2048w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-1500x682.jpg 1500w, http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Cyber-Threat-Intelligence-705x320.jpg 705w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-56yzmk-a96ffa6b86586f458863212dd677df6c\">\n.avia-section.av-56yzmk-a96ffa6b86586f458863212dd677df6c{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-56yzmk-a96ffa6b86586f458863212dd677df6c main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-16  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1052'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4gwuh8-b0ab7e89f3283e25baf8e7348c86ac70 sc-av_one_half av-equal-height-column-flextable'><div class='flex_column av-4gwuh8-b0ab7e89f3283e25baf8e7348c86ac70 av_one_half  avia-builder-el-17  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdzfp9c-c5019b6212bcd4abd373af0c20181b2f\">\n#top .av-special-heading.av-kwdzfp9c-c5019b6212bcd4abd373af0c20181b2f{\npadding-bottom:10px;\nfont-size:25px;\n}\n<\/style>\n<div  class='av-special-heading av-kwdzfp9c-c5019b6212bcd4abd373af0c20181b2f av-special-heading-h3 blockquote modern-quote  avia-builder-el-18  el_before_av_textblock  avia-builder-el-first  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>These assessments include the following:<strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdzgzxp-1693f6a6adff2f103aaf4d5714722bbb\">\n.av_textblock_section.av-kwdzgzxp-1693f6a6adff2f103aaf4d5714722bbb .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwdzgzxp-1693f6a6adff2f103aaf4d5714722bbb '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><ul style=\"font-weight: 500;\">\n<li>Pre-exploitation attacks of the threat used to test email and web security controls.<\/li>\n<li>Endpoint security threat samples detection\/removal.<\/li>\n<li>Indicators of compromise.<\/li>\n<li>Vulnerabilities exploited by the threat and vulnerable assets, thru integrations with vulnerability assessment systems.<\/li>\n<li>Detection and mitigation guidance.<\/li>\n<\/ul>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-222cgs-9cffd4a4ccfcead33fd4783b33fce8ed av_one_half  avia-builder-el-20  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdzg4e0-a8bc7129f4b1a78855ee302404d40c1e\">\n#top .av-special-heading.av-kwdzg4e0-a8bc7129f4b1a78855ee302404d40c1e{\npadding-bottom:10px;\nfont-size:25px;\n}\n<\/style>\n<div  class='av-special-heading av-kwdzg4e0-a8bc7129f4b1a78855ee302404d40c1e av-special-heading-h3 blockquote modern-quote  avia-builder-el-21  el_before_av_textblock  avia-builder-el-first  av-thin-font av-inherit-size '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Values provided:<strong><\/h3><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/strong><\/strong><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwdzhtqr-4278b2bfc3735819e07ef90316372b3b\">\n.av_textblock_section.av-kwdzhtqr-4278b2bfc3735819e07ef90316372b3b .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwdzhtqr-4278b2bfc3735819e07ef90316372b3b '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><ol style=\"font-weight: 500;\">\n<li>Save on time of threat research with prepackaged threat intelligence-led assessments including samples, IoC\u2019s CVE\u2019s, detections, and mitigations<\/li>\n<li>Identify which machines are exploitable and if compensating controls are effective<\/li>\n<li>Validate security efficacy safely in production and get test results in seconds<\/li>\n<li>Receive the updates and latest threats for your assessments daily<\/li>\n<\/ol>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-f7a622a192eb4e7c4953e9c0865ff204\">\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204{\nmargin-top:20px;\nmargin-bottom:0px;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/pexels-eduardo-dutra-2115217.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-av_section-f7a622a192eb4e7c4953e9c0865ff204 main_color avia-section-default avia-no-border-styling  avia-builder-el-23  el_after_av_section  avia-builder-el-last  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  container_wrap fullsize'  data-section-bg-repeat='stretch'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1052'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-516b7eac7a9c6cd1b746245801c7486c av_one_full  avia-builder-el-24  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-8677320905dc9bdec3e6c88e4c576590\">\n#top .av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590{\npadding-bottom:10px;\ncolor:#000000;\nfont-size:40px;\n}\n.av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590 .special-heading-inner-border{\nborder-color:#000000;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-8677320905dc9bdec3e6c88e4c576590 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-25  el_before_av_button  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Get in touch with us and receive more information on how it can help you<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap avia-button-center  avia-builder-el-26  el_after_av_heading  avia-builder-el-last ' ><a href='http:\/\/www.cyberdna.com.au\/cyber-automation\/contact\/'  class='avia-button av-av_button-4869be09c2e71144d3515a4d55b0849a avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color ' ><span class='avia_iconbox_title' >Contact<\/span><\/a><\/div><\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1052"}],"collection":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/comments?post=1052"}],"version-history":[{"count":20,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1052\/revisions"}],"predecessor-version":[{"id":1455,"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1052\/revisions\/1455"}],"wp:attachment":[{"href":"http:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/media?parent=1052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}