Jonathan Reiber «Previous: Episode 1: APT29 and Threat Informed Defense (Pilot) Next: Episode 3: Best Practices in Threat-Informed Defense»
Threat Advisories Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022January 14, 2026
Insights & Perspectives 5 Reasons You Don’t Want to Miss Purple Hats Conference 2022 ByDanielle Schmidt April 11, 2022January 14, 2026
Industry & Community Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation. ByJonathan Reiber October 29, 2021January 14, 2026
Insights & Perspectives How to Pitch Your CFO on Automated Security Control Validation ByDanielle Murcray July 9, 2021January 14, 2026
Insights & Perspectives Case Study – When Threat Intelligence and Red Team Get Married ByStephan Chenette June 25, 2019January 14, 2026
Insights & Perspectives “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021January 14, 2026