{"id":23551,"date":"2022-10-28T11:41:51","date_gmt":"2022-10-28T09:41:51","guid":{"rendered":"https:\/\/datanets.ro\/do-configuration-errors-affect-the-effectiveness-of-security-solutions-fix-them-with-breach-and-attack-simulation\/"},"modified":"2022-10-28T13:31:26","modified_gmt":"2022-10-28T11:31:26","slug":"do-configuration-errors-affect-the-effectiveness-of-security-solutions-fix-them-with-breach-and-attack-simulation","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/do-configuration-errors-affect-the-effectiveness-of-security-solutions-fix-them-with-breach-and-attack-simulation\/","title":{"rendered":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Configuration errors in security solutions are a critical problem for any company, and often traditional methods of detection and remediation are burdensome, ineffective, and require advanced skills. Cymulate&#8217;s Breach &amp; Attack Simulation solution recommended by Datanet helps you overcome these limitations by automating the testing and simulation processes, with constant updates and actionable recommendations to solve the detected issues. Additionally, the BAS Cymulate solution is affordable, easy to use, and can be up and running in just a few hours.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Ransomware, Phishing, DDoS, Cryptojacking, Social Engineering, these are terms that have already entered the common language because every day we hear news about cyber-attacks, security breaches, and new types of malware discovered. However, there is also an &#8220;invisible enemy&#8221; that the media and, unfortunately, many companies frequently ignore &#8211; configuration errors in security solutions.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-23541 size-full\" title=\"Breach and Attack Simulation\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\" alt=\"\" width=\"1200\" height=\"629\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg 1200w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1-300x157.jpg 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1-1024x537.jpg 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1-768x403.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Admittedly, an error sounds trivial for a front-page story, but &#8220;<em>Security Misconfiguration<\/em>&#8221; is a formidable enemy, with tens of thousands of active victims, being among the top five security threats included in the OWASP Top 10 ranking benchmark for the entire cyber-security industry.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: left;\"><strong>How common are the threat of configuration errors?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">According to recent estimations, nearly three-quarters of companies (73%) have at least one critical configuration error in their security solutions. According to \u201e<a href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\"><strong>Verizon Data Breach Investigations Report<\/strong><\/a>\u201c, misconfigurations of protection solutions account for more than half (55%) of the total volume of &#8220;mistakes&#8221; committed by organizations and are responsible for 20% of security breaches.<\/p>\n<p style=\"text-align: justify;\">The problem is so widespread that last year the US Information Security and Infrastructure Protection Agency (CISA) released a dedicated report (AR21-013A) in which it analyzed the impact of &#8220;Security Misconfiguration&#8221; at the US level, issuing a series of recommendations for strengthening security configurations to help organizations defend against attackers<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: left;\"><strong>What are the causes that lead to the appearance of \u201eSecurity Misconfiguration\u201c?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">On the one hand, it is the increasing volume of threats and attacks that organizations face, but also their rapid evolution. On the other hand, the multiple changes in the way of working. According to a Ponemon Institute study, nearly two-thirds of organizations purchased new security solutions in 2020 to meet the challenges posed by the widespread adoption of remote work. Meanwhile, the percentage has probably exceeded 90%.<\/p>\n<p style=\"text-align: justify;\">The problem, however, is that many of these solutions were put into use without IT departments getting to validate the newly implemented security controls. The phenomenon affects 62% of companies, and the causes range from the high speed of adoption and the excessive number of changes that had to be made, to the lack of the necessary skills in the area of cybersecurity.<\/p>\n<p style=\"text-align: justify;\">Another element that contributes to the appearance of errors is the frequent changes in the configurations of security solutions. 60% of organizations operate changes weekly, which represents more than a quarter even daily, to adapt to new emerging threats, to the evolution of business needs, to the requirements of end users, partners, customers, etc.<\/p>\n<p style=\"text-align: justify;\">It is too highly frequent considering that more than half of IT departments do not feel at all comfortable with the tasks they have in the protection zone and complain that<span style=\"font-size: 16px;\">:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 16px;\">Have to manage too many security products \u2013 59%;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Security applications have become too complex \u2013 55%;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Updates and patches issued by security vendors generate breaches and configuration errors \u2013 53%.<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: left;\"><strong>Why configuration errors are not detected?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Apparently, the risks are aware and most organizations (61%) claim to validate the effectiveness of the configurations used, as well as the changes made. But less than a third think the testing methods are really effective and only one in five tests weekly.<\/p>\n<p style=\"text-align: justify;\">Why they don&#8217;t do it more often? The answer is not hard to guess<span style=\"font-size: 16px;\">t:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>Most companies do not have the necessary skills internally;<\/li>\n<li>Testing configurations of security solutions consume time and money and can affect the operation and\/or performance of production equipment;<\/li>\n<li>Usual methods \u2013 such as traditional vulnerability scanning \u2013 are ineffective, because they fail to reproduce the new technical tactics and procedures (TTPs) used by attackers.<\/li>\n<\/ul>\n<h2 style=\"text-align: left;\"><strong>What offers a Breach and Attack Simulation solution such as Cymulate?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Breach &amp; Attack Simulation (BAS) is a relatively new category of security solutions, named by Gartner as an &#8220;Emerging Technology&#8221; in 2017. But even though it&#8217;s only been 5 years since its &#8220;official&#8221; recognition, BAS is starting to catch on to more followers because it addresses exactly the needs detailed above: it helps organizations validate the effectiveness of security configurations on an ongoing basis with automation and simulations after real attacks. Thus, a BAS solution can perform, automatically or manually, the scanning and testing of configurations and can generate and test &#8211; also automatically &#8211; a wide spectrum of attacks, on several vectors. Based on the results obtained, companies can identify both misconfigurations and gaps in their security architecture.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">To achieve these results, Datanet recommends using <a href=\"https:\/\/cymulate.com\/breach-and-attack-simulation\">Cymulate<\/a>&#8216;s Breach and Attach Simulation solution, that is the leader in the BAS application market and comes with a number of advantages that differentiates it from the rest of the competitors, such as:<\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 16px;\">The deployment and up and running within hours;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">It&#8217;s simple to use \u2013 the solution is delivered from the cloud, as a subscription, and uses an agent-based scanning method that can be easily installed on both physical and virtual devices;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">It is constantly updated with new threats and attacks and benefits from the permanent support of teams of cybersecurity professionals;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Automates the verification and testing processes of security solution configurations;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Simulates a wide spectrum of attacks and threats with out-of-the-box test scenarios;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Creates simulations that do not affect the safety and performance of production environments;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Allows advanced customization, from the interface level to the ability to create specific attack sequences;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Identifies gaps and evaluates test and simulation results using industry-validated best practices and frameworks (MITRE ATT&amp;CK and NIST 800-53 REV 5);<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Has a large coverage area: from Data Exfiltration risks and advanced attack scenarios (Fin8, APT38, Lazarus, etc.), to the validation of protection measures at the level of email, web, WAF and terminal equipment;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Provides detailed reports and concrete recommendations for remediation of identified problems, which include proposals for software updates and configuration changes to security policy revisions;<\/span><\/li>\n<li><span style=\"font-size: 16px;\">Ensures rapid return on investment by obtaining optimal performance from proprietary security solutions, as well as easy integration with other types of applications (EDR, SIEM, SOAR, etc.)<\/span><\/li>\n<\/ul>\n<h2 style=\"text-align: left;\"><strong>How can we help you?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Traditional procedures for manually testing security configurations are burdensome, require large investments \u2013 in terms of time and resources \u2013 and have low efficiency. Cymulate&#8217;s BAS solution eliminates these problems by automating the testing and simulation processes, enabling security teams to assess the level of protection of their organizations in real-time. The Cloud-as-a-Service delivery model makes Cymulate&#8217;s BAS solution accessible to all businesses, and superior customization capabilities ensure rapid adaptation to the specific needs of any organization.<\/p>\n<p style=\"text-align: justify;\">Datanet Systems is a Cymulate partner and can help you exploit the advantages of the BAS solution by offering complete services, from implementation to training. For more technical or commercial information about the BAS Cymulate solution and about the services provided by the Datanet Systems team, we invite you to contact us at<span style=\"font-size: 16px;\">\u00a0<\/span><a style=\"font-size: 16px; background-color: #ffffff;\" href=\"mailto:sales@datanets.ro\">sales@datanets.ro<\/a><span style=\"font-size: 16px;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4 style=\"text-align: left;\"><strong>About Cymulate<\/strong><\/h4>\n<p style=\"text-align: justify;\">Cymulate was founded in 2016 in Israel, with the founding members of the company having experience in the field of Military Intelligence and IT security services for organizations. In just six years, the company has grown to a global presence, serving hundreds of companies, with an impressive track record. Cymulate&#8217;s BAS solution has been awarded &#8220;Best Breach and Attack Simulation Platform&#8221; at the Cybersecurity Excellence Awards two years in a row (2021, 2022) and is the market leader according to Frost &amp; Sullivan analysts.<\/p>\n<p style=\"text-align: justify;\">______________________<\/p>\n<p style=\"text-align: left;\"><em>References:<\/em><\/p>\n<p style=\"text-align: left;\"><em>&#8211; <a href=\"https:\/\/owasp.org\/Top10\/A05_2021-Security_Misconfiguration\/\">https:\/\/owasp.org\/Top10\/A05_2021-Security_Misconfiguration\/<\/a><\/em><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\"><em>&#8211; https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report<\/em><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/cymulate.com\/resources\/ponemon-report\/\"><em>&#8211; https:\/\/cymulate.com\/resources\/ponemon-report\/<\/em><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/cymulate.com\/resources\/bas-the-year-2021\/?SANS_award\"><em>&#8211; https:\/\/cymulate.com\/resources\/bas-the-year-2021\/?SANS_award<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About configuration errors that can be fixed with Breach and Attack Simulation!<\/p>\n","protected":false},"author":9,"featured_media":23542,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[32],"tags":[250,248,165],"class_list":["post-23551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-stiri-si-noutati","tag-automation-en","tag-cybersecurity-en-2","tag-efficiency"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation<\/title>\n<meta name=\"description\" content=\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\" \/>\n<meta property=\"og:description\" content=\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-28T09:41:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-28T11:31:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vasile Gabriel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasile Gabriel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/\"},\"author\":{\"name\":\"Vasile Gabriel\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\"},\"headline\":\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\",\"datePublished\":\"2022-10-28T09:41:51+00:00\",\"dateModified\":\"2022-10-28T11:31:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/\"},\"wordCount\":1313,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\",\"keywords\":[\"Automation\",\"Cybersecurity\",\"Efficiency\"],\"articleSection\":[\"\u0218tiri \u0219i nout\u0103\u021bi\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/\",\"name\":\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\",\"datePublished\":\"2022-10-28T09:41:51+00:00\",\"dateModified\":\"2022-10-28T11:31:26+00:00\",\"description\":\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOUT\u0102\u021aI \u0218I EVENIMENTE\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0218tiri \u0219i nout\u0103\u021bi\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/stiri-si-noutati\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\",\"name\":\"Vasile Gabriel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"caption\":\"Vasile Gabriel\"},\"sameAs\":[\"https:\\\/\\\/datanets.ro\"],\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/gabrielv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","description":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/","og_locale":"en_US","og_type":"article","og_title":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","og_description":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","og_url":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2022-10-28T09:41:51+00:00","article_modified_time":"2022-10-28T11:31:26+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg","type":"image\/jpeg"}],"author":"Vasile Gabriel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vasile Gabriel","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/"},"author":{"name":"Vasile Gabriel","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b"},"headline":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","datePublished":"2022-10-28T09:41:51+00:00","dateModified":"2022-10-28T11:31:26+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/"},"wordCount":1313,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg","keywords":["Automation","Cybersecurity","Efficiency"],"articleSection":["\u0218tiri \u0219i nout\u0103\u021bi"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/","url":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/","name":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg","datePublished":"2022-10-28T09:41:51+00:00","dateModified":"2022-10-28T11:31:26+00:00","description":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation","breadcrumb":{"@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/Ghid-Datanet-Systems-pentru-adoptarea-Cisco-SD-WAN-11-1.jpg","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/remediati-erorile-de-configurare-cu-breach-and-attack-simulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NOUT\u0102\u021aI \u0218I EVENIMENTE","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/"},{"@type":"ListItem","position":3,"name":"\u0218tiri \u0219i nout\u0103\u021bi","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/stiri-si-noutati\/"},{"@type":"ListItem","position":4,"name":"Do configuration errors affect the effectiveness of security solutions? Fix them with Breach and Attack Simulation"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b","name":"Vasile Gabriel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","caption":"Vasile Gabriel"},"sameAs":["https:\/\/datanets.ro"],"url":"https:\/\/datanets.ro\/en\/author\/gabrielv\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=23551"}],"version-history":[{"count":4,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23551\/revisions"}],"predecessor-version":[{"id":23558,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23551\/revisions\/23558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/23542"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=23551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=23551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=23551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}