7 Steps of the MITRE ATT&CK®-based Analytics Development Method

What is the MITRE ATT&CK®-based analytics development method? The MITRE ATT&CK-based analytics development method is a process of using red and blue team engagements to develop and improve the analytics…

How to Use MITRE ATT&CK® to Map Defenses and Understand Gaps

Developing detection and prevention controls for techniques in the enterprise matrix The MITRE ATT&CK® framework is a useful way to standardize cybersecurity terminology and provides a framework for organizations to…

Using MITRE ATT&CK®-based analytics for threat detection: 5 principles

MITRE ATT&CK-based threat detection vs. conventional methods A number of traditional methods for threat detection exist; however, cyber threat actors have developed methods for evading these, such as: Tool Testing:…

Use cases for implementing the MITRE ATT&CK® framework

The MITRE ATT&CK ® framework is a vast repository of cybersecurity knowledge.  Each of the MITRE ATT&CK framework outlines a number of goals that an attacker may need to achieve…

How to Use the MITRE ATT&CK® Framework and the Lockheed Martin Cyber Kill Chain Together

What is the Lockheed Martin Cyber Kill Chain? The Lockheed Martin Cyber Kill Chain is the first attempt to describe the structure and lifecycle of a cyberattack.  It breaks a…