Aug. 11, 2022, 1:37 a.m. | Dark Reading Staff, Dark Reading

Dark Reading www.darkreading.com

The new open source tools are designed to help defense, identity and access management, and security operations center teams discover vulnerable network shares.

adversary adversary simulation open source open source tools simulation tools

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)