Artificial Intelligence Weekly – MITRE ATT&CK framework for discovering cyberattackers – Dec 17th 2019

Cybersecurity | MITRE ATT&CK

Hi There!

We’re happy to introduce you to a strange new ampersand-infused acronym: MITRE ATT&CK.

This framework has gained a lot of popularity in the security industry over the past year and Google Trends tells us that this keyword is red hot! But what is MITRE ATT&CK™ all about, and why should cybersecurity pros pay attention?

For those who are not familiar, ATT&CK is the Adversarial Tactics Techniques and Common Knowledge framework available from MITRE. It is a curated knowledge base of tactics and hundreds of techniques that attackers can leverage when compromising enterprises.

There are a number of ways an organization can use it, so we have developed this special edition for you with the collaboration of VMware Carbon Black, global leader in cybersecurity.

In it, you’ll find a careful selection of the most relevant news from trusted leaders in the security industry, along with a workbook developed by VMware Carbon Black and that provides a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps.

We hope this issue will be a useful resource for you and your team.

Artificial Intelligence Weekly


Download this workbook today and learn more!

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps.

In The News

What is Incident Response?

Incident response (IR) is the systematic approach taken by an organization to prepare for, detect, contain, and recover from a cybersecurity breach.

Security 101: What Is a Man-in-the-Middle Attack?

A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.

10 Common Questions About Threat Hunting

New to Threat Hunting? Have lots of questions and don’t know where to start? Chris Brenton answers 10 frequently asked questions related to …

Insight into NIS Directive sectoral incident response capabilities

An analysis of current operational incident response (IR) set-up within the NIS Directive sectors has been released by ENISA.

The Githubification of InfoSec

Where MITRE ATT&CK provides a great repository of insight in techniques used by adversaries, Sigma can turn these insights into defensive action by providing a way to self-document concrete logic for detecting attacker techniques so defenders make it actionable.

How to Choose a Cybersecurity Career Path

Every Cybersecurity Career Path Is Different My own career voyage might be best described as what happens when you’re blown about by the winds of fate.

This RSS feed is published on
You can also subscribe
via email.

Source link

Related posts

Artificial Intelligence for Mass Surveillance? – AI Daily


How Artificial Intelligence is helping farmers in Indian villages


Trump fights with Google over Chinese military, AI scoops Turing Prize, Dota2 competition coming


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy