Attack Path Mapping (APM) uses a combination approach to reveal the most likely methods that a cybercriminal can use for a breach.