AttackIQ in the News
A Deep Interview with Jonathan Reiber on How to Become an Effective Cybersecurity Leader
I think people in cybersecurity will fetishize the technology and not focus enough on the human skills required for success within an organization.
AttackIQ CEO Reveals How to Achieve an Assume Breach Mindset
Brett Galloway joined The Tech Talks Daily Podcast to discuss how security leaders can build a comprehensive defense-in-depth strategy.
US Cyber-Defense Agency Urges Companies to Automate Threat Testing
The US government’s cyber defense agency is recommending that companies embrace automated continuous testing.
BBC Issues Cyber Attack Warning: Watch the Interview
BBC explores cybersecurity risks facing Ukraine, and how the country narrowly avoided a critical infrastructure attack.
- Mariah Simank
10Fold for AttackIQ
- eSecurity Planet’s 2022 Cybersecurity Product AwardsBest Breach and Attack Simulation (BAS) Solution
- 2022 SC Excellence AwardBest IT Security-Related Training Program
- 2022 Globee Gold AwardsBest IT Company of the Year
Best Security Awareness Computer-Based Training for Purple Hats Conference
Hot Technology of the Year
Best Awareness and Educational Program for AttackIQ Academy
- CRN® Partner Program Guide2022 Accelerate Partner Program
- American Security Today ‘ASTORS’ Homeland Security AwardsGold Award for Best Breach and Attack Simulation Solutions
Featured Press Releases
Aug. 3, 2023
AttackIQ delivers testing for everyone via AttackIQ Flex, AttackIQ Ready! and AttackIQ Enterprise product offerings. Users anywhere in the world can now use AttackIQ’s advanced adversary emulation capabilities to test. They can do so with any budget, with a simplified testing experience, and with comprehensive risk visibility in minutes. And the best part is: You don’t need to be a cybernerd. Anyone in an organization can do it.
Apr. 4, 2023
AttackIQ®, an independent vendor of Breach and Attack Simulation (BAS) solutions, today announced the availability of the AttackIQ Security Optimization Platform in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. AttackIQ customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management.
Mar. 30, 2023
AttackIQ Launches Breach and Attack Simulation-as-a-Service, Delivering Breach and Attack Simulation Solutions to Everyone
AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) solutions, today announced the availability of, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations’ security posture and security program performance. The service was designed to simplify the execution of a continuous security validation program, showing results in real-time and orchestrating faster remediation—all through one automated platform—for everyone who wants it.
Sept. 21, 2022
AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced the appointment of George Tomic as Chief Development Officer (CDO). Tomic joins effective immediately to oversee product development strategy and execution.
Aug. 17, 2022
AttackIQ Becomes First Breach and Attack Simulation Provider to Secure Authority to Operate from the United States Army
AttackIQ is the first Breach and Attack Simulation platform to receive this ATO designation. It will allow the U.S. Army to use AttackIQ’s Security Optimization Platform to develop a more strategic and proactive defense posture across their mission-critical assets in support of warfighters around the globe.
Featured Blog Posts
MITRE ATT&CK at Seven: The Seven Biggest Milestones
It’s been seven years since the MITRE ATT&CK framework was first published. Here, we look at some of the major milestones in its development and examine how the framework has become a game-changer for enterprise cybersecurity.
Announcing AttackIQ’s Malware Emulation Attack Graphs
Defenders can then improve their security posture by testing their defenses against the malware advance, but only if the assessment can be done easily. Attack graphs give us a means of arranging real-world malware into its component TTPs to run emulations.