• Demo
  • Sign-Up for Flex
  • Login to Flex
  • CTEM
  • Platform
    • Platform
    • Platform Overview
    • AttackIQ Command Center
    • AttackIQ Enterprise
    • AttackIQ Ready!
    • AttackIQ Flex
  • Platform
    • Platform
    • Platform Overview
    • AttackIQ Command Center
    • AttackIQ Enterprise
    • AttackIQ Ready!
    • AttackIQ Flex
  • Solutions
    • Solutions
    • CTEM
    • Security Control Validation
    • MITRE ATT&CK
    • Cloud Security Optimization
    • Compliance Optimization
    • PREACT™ Security Optimization Program
  • Solutions
    • Solutions
    • CTEM
    • Security Control Validation
    • MITRE ATT&CK
    • Cloud Security Optimization
    • Compliance Optimization
    • PREACT™ Security Optimization Program
  • Partners
  • Academy
  • Resources
    • Blog
    • All Posts
    • Cyberattack
    • Ransomware
    • Threat-informed defense
    • Breach and Attack Simulation
    • Cloud Security
    • Resources
    • All Resources
    • CISO Guides
    • Case Studies
    • eBooks
    • Guides
    • Dummies Guides
    • Webinars
    • Additional Resources
    • Adversary Research Team
    • Think Bad, Do Good Podcast
    • Community
    • Glossary
  • Resources
    • Blog
    • All Posts
    • Cyberattack
    • Ransomware
    • Threat-informed defense
    • Breach and Attack Simulation
    • Cloud Security
    • Resources
    • All Resources
    • CISO Guides
    • Case Studies
    • eBooks
    • Guides
    • Dummies Guides
    • Webinars
    • Additional Resources
    • Adversary Research Team
    • Think Bad, Do Good Podcast
    • Community
    • Glossary
  • Demo
  • Sign-Up for Flex
  • Login to Flex
See All Posts

Breach and Attack Simulation

Risky Business #624 — AttackIQ’s Mark Bagley and Jonathan Reiber talk with Patrick Gray of Risky Biz about how to solve the ransomware problem

Published May 19, 2021


Contributors

  • AttackIQ, Inc.
    AttackIQ, Inc.

More by this author

Breach and Attack Simulation

Join CSAA Insurance Group CISO Marlys Rodgers for a conversation about the strategic benefits of automated Breach and Attack Simulation (BAS) and security optimization.

Read More
Breach and Attack Simulation

Cyber Criminals Target “Weakest Link” in the Supply Chain as European Firms Accelerate Digitisation Strategies

Read More
Breach and Attack Simulation

Risky Biz Soap Box: Mapping NIST 800-53 to MITRE ATT&CK

Read More

TAGS:

Breach & Attack Simulation , Center for Threat-Informed Defense , Ransomware

About the Author

  • AttackIQ, Inc.
    AttackIQ, Inc.
    AttackIQ®, the leading provider of Adversarial Exposure Validation (AEV) solutions, is trusted by top organizations worldwide to validate security controls in real time. By emulating real-world adversary behavior, AttackIQ closes the gap between knowing about a vulnerability and understanding its true risk. AttackIQ’s AEV platform aligns with the Continuous Threat Exposure Management (CTEM) framework, enabling a structured, risk-based approach to ongoing security assessment and improvement. The company is committed to supporting its MSSP partners with a Flexible Preactive Partner Program that provides turn-key solutions, empowering them to elevate client security. AttackIQ is passionate about giving back to the cybersecurity community through its free award-winning AttackIQ Academy and founding research partnership with MITRE Center for Threat-Informed Defense. Learn More
  • Twitter
  • LinkedIn
  • YouTube

171 Main Street, Suite 656
Los Altos, CA 94022
+1 (888) 588-9116

  • CTEM
  • MITRE ATT&CK
  • Adversary Research Team
  • Blog
  • Who We Are
  • AttackIQ Community
  • Customers
  • Support
  • Contact
  • Careers
Privacy EULA
©2026 AttackIQ. All right reserved.