Cybersecurity | MITRE ATT&CK
We’re happy to introduce you to a strange new ampersand-infused acronym: MITRE ATT&CK.
This framework has gained a lot of popularity in the security industry over the past year and Google Trends tells us that this keyword is red hot! But what is MITRE ATT&CK™ all about, and why should cybersecurity pros pay attention?
For those who are not familiar, ATT&CK is the Adversarial Tactics Techniques and Common Knowledge framework available from MITRE. It is a curated knowledge base of tactics and hundreds of techniques that attackers can leverage when compromising enterprises.
There are a number of ways an organization can use it, so we have developed this special edition for you with the collaboration of VMware Carbon Black, global leader in cybersecurity.
In it, you’ll find a careful selection of the most relevant news from trusted leaders in the security industry, along with a workbook developed by VMware Carbon Black and that provides a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps.
We hope this issue will be a useful resource for you and your team.
Artificial Intelligence Weekly
Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps.
In The News
Incident response (IR) is the systematic approach taken by an organization to prepare for, detect, contain, and recover from a cybersecurity breach.
A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.
New to Threat Hunting? Have lots of questions and don’t know where to start? Chris Brenton answers 10 frequently asked questions related to …
An analysis of current operational incident response (IR) set-up within the NIS Directive sectors has been released by ENISA.
Where MITRE ATT&CK provides a great repository of insight in techniques used by adversaries, Sigma can turn these insights into defensive action by providing a way to self-document concrete logic for detecting attacker techniques so defenders make it actionable.
Every Cybersecurity Career Path Is Different My own career voyage might be best described as what happens when you’re blown about by the winds of fate.