Ronan

About Ronan Lavelle

This author has not yet filled in any details.
So far Ronan Lavelle has created 95 blog entries.

How to test Red Canary MITRE ATT&CK Forever Techniques

At the recent MITRE ATT&CK conference, ATT&CKCon in Washington, leading MSSP Red Canary presented an interesting keynote presentation on how they advise organisations should use MITRE ATT&CK in cyber defence. The first takeaway is: Don't boil the ocean. Many organisations waste their time and efforts on vanity statistics, particularly when trying to map their detection

By |2025-10-21T11:30:50+00:00October 21st, 2025|Blog|Comments Off on How to test Red Canary MITRE ATT&CK Forever Techniques

Defending Against AI-Powered Ransomware: A New Era of Cyber Threats

Cybersecurity is a constant battle, with threat actors continuously evolving their methods. The emergence of AI-powered ransomware represents a significant leap forward in this arms race, posing a new challenge for defenders. A recent proof-of-concept (POC) developed by the University of New York (NYU) highlights just how dangerous this threat could become. The researchers at

By |2025-10-22T07:51:29+00:00September 17th, 2025|Blog|Comments Off on Defending Against AI-Powered Ransomware: A New Era of Cyber Threats

What to expect from a BAS tool

The Breach and Attack Simulation (BAS) market is still relatively new for many companies and like all new ideas and concepts, it can take some time to fully understand how to embrace, so here are five key things that you should expect from a BAS tool. Validate security control effectiveness • test endpoint • lateral

By |2025-08-11T07:18:14+00:00August 8th, 2025|Blog|Comments Off on What to expect from a BAS tool

How does automation support proactive cybersecurity?

Automation: Transforming Cybersecurity from Reactive to Proactive Automation transforms cybersecurity from reactive to proactive by continuously monitoring, testing, and validating security controls against real-world threats. Through automated tools, organisations can simulate attacks based on frameworks like MITRE ATT&CK, identify vulnerabilities before attackers exploit them, and efficiently remediate security gaps across Windows, Linux, and Mac environments.

By |2025-06-06T14:01:15+00:00May 5th, 2025|Blog|Comments Off on How does automation support proactive cybersecurity?

How can businesses shift from reactive to proactive security?

Shifting to Proactive Security: A Modern Cybersecurity Approach Shifting from reactive to proactive security represents a fundamental change in cybersecurity strategy. Rather than waiting for attacks to happen and then responding, businesses can implement continuous security validation, configuration testing, and threat-informed defense to prevent breaches before they occur. This approach identifies security gaps and excessive

By |2025-06-13T09:36:48+00:00May 5th, 2025|Blog|Comments Off on How can businesses shift from reactive to proactive security?

What are examples of proactive cybersecurity measures?

Proactive Cybersecurity: A Forward-Thinking Defence Approach Proactive cybersecurity measures are preventative actions organisations take to identify vulnerabilities and strengthen security before attacks occur. Unlike reactive approaches that respond after breaches, proactive measures actively hunt for weaknesses through techniques like attack simulation and security configuration validation. For organisations subject to regulations like NIS2, DORA, and UK

By |2025-06-13T09:36:51+00:00May 5th, 2025|Blog|Comments Off on What are examples of proactive cybersecurity measures?

5 Reasons Your Organization Needs Continuous Threat Exposure Management

Understanding Continuous Threat Exposure Management (CTEM) As cyber criminals adapt their tactics, a reactive approach is no longer adequate. Continuous Threat Exposure Management (CTEM) provides organisations with a proactive, systematic approach to identifying, assessing, and addressing security vulnerabilities before attackers can exploit them. By implementing CTEM, organisations can reduce their risk profile, improve their security

By |2025-06-06T13:55:25+00:00May 5th, 2025|Blog|Comments Off on 5 Reasons Your Organization Needs Continuous Threat Exposure Management

CTEM Explained: Making Sense of Ongoing Threat Assessments

The Evolution of Security: Understanding Continuous Threat Exposure Management Point-in-time security assessments are no longer sufficient to protect against sophisticated cyber attacks. Organisations need a more dynamic, continuous approach to identifying and addressing security vulnerabilities. Continuous Threat Exposure Management (CTEM) has emerged as a strategic framework that enables organisations to stay ahead of emerging threats

By |2025-06-06T13:59:00+00:00May 5th, 2025|Blog|Comments Off on CTEM Explained: Making Sense of Ongoing Threat Assessments

How CTEM Supports Better Business Decision-Making

Navigating the Cybersecurity Landscape with CTEM Business leaders face mounting pressure to make informed cybersecurity investment decisions with limited budgets. Cyber Threat Exposure Management (CTEM) has emerged as a critical approach for bridging the gap between security operations and business decision-making, providing evidence-based insights that drive strategic planning. Key Takeaways: CTEM provides data-driven visibility into

By |2025-06-06T13:59:04+00:00May 5th, 2025|Blog|Comments Off on How CTEM Supports Better Business Decision-Making

CTEM vs. Traditional Risk Assessments: What’s the Difference?

CTEM vs. Traditional Risk Assessments: A Modern Approach to Cybersecurity Key Takeaways: Cyber Threat Exposure Management (CTEM) offers continuous, threat-informed security validation, while traditional assessments provide point-in-time snapshots CTEM directly addresses modern threats by simulating real-world attacks based on MITRE ATT&CK framework Traditional assessments often prioritize compliance over actual threat protection CTEM helps organizations meet

By |2025-06-06T13:59:11+00:00May 5th, 2025|Blog|Comments Off on CTEM vs. Traditional Risk Assessments: What’s the Difference?
Go to Top