A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you’re protected right now. What do you do?
Traditionally, you would go with one of the options below.
Option 2 – Create a ‘carbon copy’ of your network and run the threat’s binary on that copy.
Option 3 – Build a homegrown simulation.
Option 4 – Run an automated simulation of the threat in your production environment.