Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
5 sources · matching filters · sorted by citation density
Sort
ACybersecurity5 sources
01

The standardized vulnerability severity scoring system referenced by virtually every vuln management program. v3.1 widely deployed; v4.0 introduces threat and environmental refinements.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
02

Originating Gartner article that defined CTEM as a five-stage program: scoping, discovery, prioritization, validation, mobilization. The reference for the CTEM acronym and process model.

ResearchIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
03

Federal methodology for security assessments: target identification, vulnerability analysis, validation. Underpins both penetration testing and exposure management programs.

Test your knowledge · A24
04

Practical methodology for identifying and reducing attack surface in applications. Covers entry points, data flows, and trust boundaries. The application-layer complement to network EASM.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
05

Industry-standard tool for external attack surface discovery. Scans the public internet, exposes service banners, supports queries for specific exposures. The reference for EASM tooling questions.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.