In the News
PRESS RELEASE: Recognize Announces Investment in Security Risk Advisors
Recognize announces a strategic investment in Security Risk Advisors, a leading cybersecurity services firm specializing in advisory, managed security, and proprietary software solutions. This partnership aims to accelerate growth and innovation in the face of evolving cyber threats.
Office of the CISO
Beyond Compliance: Maximizing the Benefits of HIPAA Risk Assessments for Comprehensive Cybersecurity
Discover how HIPAA risk assessments can go beyond compliance to enhance cybersecurity resilience, support future initiatives, and drive cost savings for healthcare organizations. Learn more in this blog from Security Risk Advisors.
Tools
Pruning Garden Paths in AWS with Neph
Explore Neph, Security Risk Advisors’ free, graph-based tool for AWS security analysis. Learn how it maps attack paths, handles IAM complexities, and supports iterative analysis to enhance cloud security workflows.
The Shiny New Object: Is It Worth Deploying Purview’s New AI Functionality Yet?
Microsoft’s new AI functionalities in Purview offer exciting possibilities for data security investigations and posture management. Our blog explores the features, deployment challenges, and cost considerations to help organizations make informed decisions.
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
PRESS RELEASE: SRA Appoints Suzanne Hall as CISO in Residence to Advance Global Cybersecurity Strategy and Capabilities
Security Risk Advisors welcomes Suzanne Hall as CISO in Residence to advance global cybersecurity strategies and deliver business-aligned solutions for clients.
Clean Up Your DNS Records Before We Get Ants (or Hacked)
Dangling DNS records can lead to subdomain takeovers and other security risks. Learn how to maintain good DNS hygiene and protect your organization from malicious actors in our latest blog by Joel Wadley.
PRESS RELEASE: CrowPilot by Security Risk Advisors now generally available in Microsoft Security Copilot
Security Risk Advisors announces the general availability of CrowPilot in the Microsoft Security Store, an AI agent that integrates Microsoft Security Copilot with CrowdStrike Falcon EDR, empowering SOC teams to streamline operations and achieve faster, smarter threat responses.
As ClickFix Continues to Surge: Filefix Emerges as a Similarly Dangerous Social Engineering Tactic
FileFix, an evolution of the ClickFix social engineering tactic, is rapidly gaining traction. Learn how it works, its impact on organizations, and the steps your security team can take to detect and mitigate this growing threat.
Pruning Garden Paths in AWS with Neph
Explore Neph, Security Risk Advisors’ free, graph-based tool for AWS security analysis. Learn how it maps attack paths, handles IAM complexities, and supports iterative analysis to enhance cloud security workflows.
Automating Purple Team Execution with Mythic and Apollo
Discover how to automate purple team exercises with Mythic C2, Apollo, and Jupyter notebooks. Learn about attack automation, integrations, and tools to streamline your security operations in our latest blog.
PRESS RELEASE: Recognize Announces Investment in Security Risk Advisors
Recognize announces a strategic investment in Security Risk Advisors, a leading cybersecurity services firm specializing in advisory, managed security, and proprietary software solutions. This partnership aims to accelerate growth and innovation in the face of evolving cyber threats.
PRESS RELEASE: Security Risk Advisors is a Proud Participant in the Microsoft Sentinel Partner Ecosystem
Security Risk Advisors joins the Microsoft Sentinel Partner Ecosystem, contributing innovative tools and expertise to enhance Sentinel’s AI-ready platform and empower organizations to detect, respond to, and mitigate threats effectively.
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
Introducing Tier 0: How AI Is Empowering the Agentive SOC
Discover how Tier 0, powered by SCALR AI, is transforming Security Operations Centers. By automating repetitive tasks and enriching alerts, Tier 0 enables analysts to focus on real threats, creating a smarter, more sustainable SOC. Learn more about this innovative approach.
SRA Earns Microsoft Identity and Access Management Specialization
Security Risk Advisors has earned the Microsoft Solution Partner Specialization for Identity and Access Management. This is a big step forward for our team and another example of how we are continuing to grow our alignment with Microsoft.
Building Practical Resilience: The Table-Top Exercise (TTX) Execution Playbook
This playbook on facilitating an effective TTX can help lead you to success. Whether you run them yourselves on call or have an external organization like SRA to help facilitate, they should stoke conversations that lead to meaningful improvement, role clarity, and help make a real incident a little less painful.
Reining in SaaS Sprawl: Implementing a Robust Governance Program
Hypothetical Scenario – One of your primary accounting team members is no longer employed by your organization. Do you know what financial software-as-a-service (SaaS) applications they were using? Do you know if that user accessed any SaaS applications using...
Casting a New Vision for Red Teams
Red Teams have exploded in popularity and funding over the past 8+ years. They have evolved their skill and grown their team members, but many Red Teams have not evolved their scope and deliverables to maximize value for the organizations they help protect. Red...
CISO Guidance for AI Security
AI introduces both risks and opportunities for businesses, and organizations should be prepared to protect their AI technology at the same level they protect traditional “crown jewel” or other sensitive data. Senior leadership will look to CISOs for guidance both on how to protect AI and how to use it to enhance the security of their organizations. What follows is some guidance on how a CISO might proceed as AI technology evolves and is deployed.
Using Tabletop Exercises to Strengthen OT Security Maturity
If you are part of an organization grappling with how to secure your Operational Technology (OT) environment, you are not alone. Let’s start with the basics: Do you have an Incident Response Plan (IRP) that includes your OT environments and assets? Hint: the...
Continuous Security Testing Programs
Continuous testing should be multi-threaded, not just red teaming or using one tool.
Save Budget and Improve Your Logging and Monitoring Capabilities
In budget-tightening times, a security data pipeline can greatly reduce your SIEM costs and increase log efficiency. SRA has implemented this new approach for many of our clients, helping them realize significant savings by reducing log size and volume ingested by...
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
Pruning Garden Paths in AWS with Neph
Explore Neph, Security Risk Advisors’ free, graph-based tool for AWS security analysis. Learn how it maps attack paths, handles IAM complexities, and supports iterative analysis to enhance cloud security workflows.
Just Another Kusto Hacker – Behind the Scenes Breakdown!
Participating in the “Just Another Kusto Hacker” challenge was an incredible opportunity to push my skills with Kusto Query Language (KQL) to the next level. Winning the challenge was not just a personal milestone but also a reflection of the expertise and creativity we foster at SRA. Azure Data Explorer (ADX) is a key technology for us, powering our SCALR Sight platform and enabling us to analyze vast cybersecurity datasets to deliver actionable insights to our clients.
Beware of ClickFix: A Growing Social Engineering Threat
ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.
Penetration Testing in a Continuous Security Testing Program
Overview At SRA, we have seen firsthand that incorporating both penetration tests and purple teams in a cyber security program provides a healthy balance between increasing both prevention and detection capabilities. A penetration test is a simulated cyber-attack...
PDCD: Orchestrating Payload Generation
PDCD is a command-line tool designed to generate payloads by running single-purpose Docker containers either locally or remotely.
Timberlake: AWS Attack Automation
Timberlake is a tool we are releasing that helps to automate AWS attack simulations. It was originally designed to support our purple team operations here at Security Risk Advisors. In this blog, we will introduce the Timberlake tool and its functionality.
Operationalizing ShotHound to Enhance Active Directory Resilience
Explore beyond ransomware: Strengthen AD security and mitigate attack paths with BloodHound analysis and ZeroNetworks tools.
This Traversal had a Face for Radio (CVE-2020-17383)
Quick Seek Mode – TL; DR An interesting directory traversal was identified by SRA during an external penetration test for one of our clients. In addition to the standard checks for Linux filesystems, the team discovered how to disclose the password for the web UI...
Project SHADOWSTAR: A Data Driven Approach to Network Block Enumeration (Part 2)
Discover SHADOWSTAR, a tool for fast, thorough network block enumeration, enhancing penetration testing and red teaming.
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
Automating Purple Team Execution with Mythic and Apollo
Discover how to automate purple team exercises with Mythic C2, Apollo, and Jupyter notebooks. Learn about attack automation, integrations, and tools to streamline your security operations in our latest blog.
Enhancing Purple Team Testing with ALLCAPS: A Capability-Based Approach to Execution
Discover how the ALLCAPS framework enhances Purple Team exercises by focusing on capability-based detection development. Learn how to improve testing strategies and align detection logic with attack techniques for better security outcomes.
PRESS RELEASE: VECTR Enterprise Now Available on Azure Marketplace
FOR IMMEDIATE RELEASE Philadelphia, PA - August 4, 2025 - Security Risk Advisors (SRA) is proud to announce that VECTR Enterprise, its premier adversary emulation and purple teaming platform, is now available on the Microsoft Azure Marketplace. This milestone marks a...
Sharpening Offensive Skills Through Purple Teams
Discover how purple teams bridge the gap between red and blue teams, offering red teamers real-time feedback, hands-on experience with defensive tools, and insights into enterprise environments. Learn how this collaborative approach sharpens offensive skills and enhances detection strategies.
Using Purple Teams to Set Detection Engineering Priorities
Purple Teams play a crucial role in enhancing detection engineering efforts by combining the offensive expertise of red teams with the defensive strategies and knowledge of blue teams. By leveraging the insights gained from simulating real-world attacks, organizations can identify detection opportunities and prioritize their engineering efforts.
Coercing Authentication from a Domain System: Analyzing a New Test Case from the 2025 Threat Simulation Index
Explore the latest addition to SRA’s 2025 Threat Simulation Index: the “Coerce Authentication from Domain System” test case. This blog post delves into how tools like PetitPotam and Coercer exploit Windows RPC protocols to force domain systems into unintended authentications. Ideal for purple teams aiming to benchmark and enhance their organization’s threat resilience.
VECTR Satellite Launches in the Azure Marketplace: A Managed Service for Enhanced Threat Resilience
Security Risk Advisors is thrilled to announce the launch of VECTR Satellite in the Azure Marketplace! This milestone marks a significant step forward in empowering organizations to strengthen their cybersecurity posture through a managed platform that operates securely within the confines of an organization’s own private Azure tenant.
Beware of ClickFix: A Growing Social Engineering Threat
ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.
Developing Purple Team Attack Plans from Threat Intelligence
Learn how purple teams can turn threat intelligence into actionable attack plans. This guide covers scoping, TTP analysis, and building intel-based purple team exercises.
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
Clean Up Your DNS Records Before We Get Ants (or Hacked)
Dangling DNS records can lead to subdomain takeovers and other security risks. Learn how to maintain good DNS hygiene and protect your organization from malicious actors in our latest blog by Joel Wadley.
As ClickFix Continues to Surge: Filefix Emerges as a Similarly Dangerous Social Engineering Tactic
FileFix, an evolution of the ClickFix social engineering tactic, is rapidly gaining traction. Learn how it works, its impact on organizations, and the steps your security team can take to detect and mitigate this growing threat.
Introducing Tier 0: How AI Is Empowering the Agentive SOC
Discover how Tier 0, powered by SCALR AI, is transforming Security Operations Centers. By automating repetitive tasks and enriching alerts, Tier 0 enables analysts to focus on real threats, creating a smarter, more sustainable SOC. Learn more about this innovative approach.
Just Another Kusto Hacker – Behind the Scenes Breakdown!
Participating in the “Just Another Kusto Hacker” challenge was an incredible opportunity to push my skills with Kusto Query Language (KQL) to the next level. Winning the challenge was not just a personal milestone but also a reflection of the expertise and creativity we foster at SRA. Azure Data Explorer (ADX) is a key technology for us, powering our SCALR Sight platform and enabling us to analyze vast cybersecurity datasets to deliver actionable insights to our clients.
Beware of ClickFix: A Growing Social Engineering Threat
ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.
The Entra-nce to Tenant Maturity
SRA has developed a maturity strategy for identity and access management (IAM) in Entra ID. The goal is for our clients and readers to achieve the “Modern” maturity level and aspire to be at the “Advanced” maturity level.
Limiting WMI Lateral Movement via DCOM Permissions
If you are looking for a way to curb WMI-based lateral movement – and especially if you do not want a dependency on another control, such as a firewall – DCOM permissions may prove to be a useful method that works with traditional configuration management.
Entra ID to the Rescue: Streamlining Identity Access Reviews with a Dash of Governance
The blog highlights the challenges of managing identity access reviews in complex environments and emphasizes the benefits of using automated tools like Microsoft’s Identity Governance to streamline these processes. Security Risk Advisors (SRA) offers custom solutions to help organizations implement and report on access review results, enhancing compliance and efficiency .
Security Risk Advisors Earns Microsoft Solutions Partner Designation for Infrastructure (Azure)
We are excited to share that Security Risk Advisors (SRA) has achieved the Microsoft Solutions Partner designation for Infrastructure (Azure)! This recognition reflects our proven expertise in accelerating clients' migration of critical infrastructure workloads to...
Microsoft Ignite 2025: The 6 Security Announcements Shaping 2026
Microsoft Ignite 2025 introduced six pivotal security updates, including AI governance tools, passwordless authentication, and autonomous threat response. Discover how these innovations can transform your security operations in 2026.
Introducing Tier 0: How AI Is Empowering the Agentive SOC
Discover how Tier 0, powered by SCALR AI, is transforming Security Operations Centers. By automating repetitive tasks and enriching alerts, Tier 0 enables analysts to focus on real threats, creating a smarter, more sustainable SOC. Learn more about this innovative approach.
CrowPilot: The AI Agent that Connects Security Copilot with CrowdStrike Falcon
A good security program cannot exist without good data, and for AI platforms, like Microsoft’s Security Copilot, good data is essential to maximizing effectiveness. The diverse set of security tools owned by organizations often don’t natively integrate to work...
Get Off the Neverending AI Treadmill and Secure Your Organization
This blog explores why enterprises should resist the urge to chase the latest LLMs and instead focus on securing AI adoption through cloud-based platforms like Azure, AWS, and Google Cloud. Learn how strategic AI implementation can align security, IT, and innovation for long-term success.
AI vs. AI: Red Teaming with PyRIT
This article showcases use of open source tools to use AI LLMs to attack other AI LLMs to identify security vulnerabilities.
Using Purview and M365 to Mitigate Data Security Risks in Microsoft Teams Meeting Recordings
Recording Teams meetings is a convenient way to memorialize an important discussion. But without proper controls in place, recordings can capture sensitive information, consume valuable cloud storage space, and become a data loss vector. Make sure your organization has configured the right settings to mitigate these risks and learn how to use Purview to understand if the organization is already oversharing.
Understanding and Applying Vector Databases to Supercharge your SOC with AI & Copilot for Security
Discover how Azure AI Search integration enhances threat intelligence with vector databases in Copilot for Security.
Building a Copilot for Security Custom NetFlow Plugin
We’ve built a custom Copilot for Security plugin that would take advantage of network flow data and use the power of Copilot for Security to extract the exact time and IP address of a host involved in a security incident, then go retrieve, summarize, and analyze the netflow data within 30 minutes on either side of the first noted malicious event to determine if there was potential for lateral movement or other key indicators of attack. This can give insight to understand if an attacker may have attempted to move laterally on your network, and if so where, and using which protocols.
A Quick Look at Microsoft’s Inventory of AI Solutions
Dive into AI Cybersecurity Development with SRA’s insights on Microsoft AI tools and securing AI in cyber tech.
CISO Guidance for AI Security
AI introduces both risks and opportunities for businesses, and organizations should be prepared to protect their AI technology at the same level they protect traditional “crown jewel” or other sensitive data. Senior leadership will look to CISOs for guidance both on how to protect AI and how to use it to enhance the security of their organizations. What follows is some guidance on how a CISO might proceed as AI technology evolves and is deployed.
The Shiny New Object: Is It Worth Deploying Purview’s New AI Functionality Yet?
Microsoft’s new AI functionalities in Purview offer exciting possibilities for data security investigations and posture management. Our blog explores the features, deployment challenges, and cost considerations to help organizations make informed decisions.
Beyond Compliance: Maximizing the Benefits of HIPAA Risk Assessments for Comprehensive Cybersecurity
Discover how HIPAA risk assessments can go beyond compliance to enhance cybersecurity resilience, support future initiatives, and drive cost savings for healthcare organizations. Learn more in this blog from Security Risk Advisors.
Proposed Changes to the HIPAA Security Rule
Discover the proposed 2025 HIPAA Security Rule changes—the first major update in 20 years. Learn what’s changing, why now, and how healthcare organizations can prepare for new cybersecurity compliance requirements.
Interpreting New Hospital Cybersecurity Requirements for New York State
Effective October 2nd, 2024, New York State released new Hospital Cybersecurity Requirements, in section 405.46. Learn how to configure your Azure and Sentinel ecosystem to support the log storage requirements outlined in section 405.46.
Microsoft Purview: You Get Out What You Put In
Microsoft’s recently rebranded Purview suite of data governance, security, and compliance solutions offers more capabilities than ever before within a single product. But without a fundamental understanding of your data, getting value out of these tools remains a challenge. Defining your organization’s critical data and objectives for protecting it is a critical first step in maximizing the value of any Purview deployment.
Has NIST Gone Too Far?
The newly published version of the NIST CSF has rightly elevated the importance of cybersecurity governance, but the new Govern function has a disproportionate impact on overall scoring and presents challenges when measuring improvements against the previous version of the framework.
Unleashing the Potential of PCI DSS v4: Strengthening Your Online Payment Security
Explore the impact of the new PCI DSS v4 on scripting in the cybersecurity landscape. Our blog reveals the crucial role scripts play in online payments and their accompanying security threats. Uncovering new controls (6.4.3 and 11.6.1) that require businesses to monitor and validate scripts, we compare an array of solutions including developer tools, third-party software, and innovative policies like CSP and SRI, all aiming to safeguard your environment against unauthorized changes.
Happy Birthday NIST CSF!
The NIST Cybersecurity Framework (CSF) turned 10 years old in February 2023. As the CSF begins its second decade, we revisit the framework itself, SRA’s experience with a few common challenges, and preview the coming changes.
2022 PCI Community Reflections and Why You Should Be Thinking about JavaScript Integrity Checking
TLDR: The 2022 PCI Community was in person for the first time in three years. Every few years a new risk theme develops as threats change and evolve, and this year was no different: the rise of malicious JavaScript code being deployed on compromised web servers to...
PCI Compliance at Call Centers
Call center operations are not immune to changing compliance requirements even though addressing compliance needs is not their primary function. The Payment Card Industry Security Standards Council (PCI SSC) has introduced additional guidance on securing cardholder...
Getting Started in Cyber Physical System Security Defense
TL;DR – The best way to get started with Cyber Physical System Defense is to create a defense plan, collect asset inventory, and begin implementing monitoring infrastructure. These steps are all much easier said than done. Let's say you just found out that your...
S4x23 SBOM Challenge: Post-Conference Update
If you really need one, here’s the TL;DR – The SBOM market is emerging. Asset owners are unsure if they want them and suppliers/OEM’s are either considering adoption, have already adopted, or have a “shoo fly” mentality (for now). The “SBOM Challenge” was well...
Developing SBOM as a Capability
S4x23 Presents: SBOMs Galore It seemed like a week didn’t go by in 2022 without the mention of Software Bill of Materials (SBOM) in our newsfeeds, from a client, or from a colleague, so the announcement that S4x23 would feature an SBOM challenge piqued our interest....
Using Tabletop Exercises to Strengthen OT Security Maturity
If you are part of an organization grappling with how to secure your Operational Technology (OT) environment, you are not alone. Let’s start with the basics: Do you have an Incident Response Plan (IRP) that includes your OT environments and assets? Hint: the...
What is OT?
There are many ways to think about Operational Technology (OT) aside from the official definition. I challenge you to define what “OT” is to your organization, and its alignment to your business.
PRESS RELEASE: SRA Appoints Suzanne Hall as CISO in Residence to Advance Global Cybersecurity Strategy and Capabilities
Security Risk Advisors welcomes Suzanne Hall as CISO in Residence to advance global cybersecurity strategies and deliver business-aligned solutions for clients.
PRESS RELEASE: CrowPilot by Security Risk Advisors now generally available in Microsoft Security Copilot
Security Risk Advisors announces the general availability of CrowPilot in the Microsoft Security Store, an AI agent that integrates Microsoft Security Copilot with CrowdStrike Falcon EDR, empowering SOC teams to streamline operations and achieve faster, smarter threat responses.
PRESS RELEASE: Recognize Announces Investment in Security Risk Advisors
Recognize announces a strategic investment in Security Risk Advisors, a leading cybersecurity services firm specializing in advisory, managed security, and proprietary software solutions. This partnership aims to accelerate growth and innovation in the face of evolving cyber threats.
PRESS RELEASE: Security Risk Advisors is a Proud Participant in the Microsoft Sentinel Partner Ecosystem
Security Risk Advisors joins the Microsoft Sentinel Partner Ecosystem, contributing innovative tools and expertise to enhance Sentinel’s AI-ready platform and empower organizations to detect, respond to, and mitigate threats effectively.
PRESS RELEASE: Security Risk Advisors Recognized with Microsoft Verified Managed XDR Solution Status
Security Risk Advisors achieves Microsoft Verified Managed XDR Solution status, offering 24/7 SOC operations, proactive threat hunting, and rapid incident response—all integrated with Microsoft Security tools. Learn how SRA is modernizing security operations for its clients.
PRESS RELEASE: Blackbird.AI And Security Risk Advisors Partner To Protect Enterprises From The New Threat Vector Of Narrative Attacks
Strategic alliance brings narrative intelligence to global companies to combat misinformation, disinformation, and AI-generated deepfakes that cause financial, operational, and reputational harm.
PRESS RELEASE: Security Risk Advisors Introduces SCALR AI – A Platform for Rapid Agentive AI Enablement
Security Risks Advisors (SRA), a leading cybersecurity consulting firm, today announced the launch of SCALR AI, a customizable platform designed to enable non-technical people to build and integrate agentive AI capabilities directly into their operations.
PRESS RELEASE: VECTR Enterprise Now Available on Azure Marketplace
FOR IMMEDIATE RELEASE Philadelphia, PA - August 4, 2025 - Security Risk Advisors (SRA) is proud to announce that VECTR Enterprise, its premier adversary emulation and purple teaming platform, is now available on the Microsoft Azure Marketplace. This milestone marks a...
PRESS RELEASE: Security Risk Advisors joins the Microsoft Intelligent Security Association
FOR IMMEDIATE RELEASE PHILADELPHIA, Pennsylvania, USA — January 7, 2025 — Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security...
PRESS RELEASE: Security Risk Advisors Announces Launch of VECTR Enterprise Edition
FOR IMMEDIATE RELEASE Philadelphia, PA – August 1, 2024 – Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking....
Follow us on social media

Browse our Webinars
Access these virtual events on-demand and get valuable insight from our thought leaders and subject matter experts.
Get Curated Security News and Critical Vulnerability Reports
Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats.




