Jonathan Reiber «Previous: Episode 2: How to Achieve Cybersecurity Effectiveness Next: AttackIQ’s business is not security testing.»
Adversary Emulation | Breach and Attack Simulation | Center for Threat-Informed Defense | Cyberattack | Machine Learning | Threat-Informed Defense | TTPs Testing with Realism: Attack Flows and AttackIQ Attack Graphs ByJonathan Reiber March 11, 2022July 31, 2025
Center for Threat-Informed Defense | Cybersecurity Education | MITRE ATT&CK | Threat-Informed Defense How to Test Your Defenses Against Personalized Top 10 MITRE ATT&CK Techniques ByJordan McMahon August 4, 2022July 31, 2025
Adversary Emulation | Breach and Attack Simulation | MITRE ATT&CK Leveraging the MITRE ATT&CK framework to build a threat-informed defense ByAttackIQ Team July 29, 2022
MITRE ATT&CK | Ransomware | Threat-Informed Defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Threat-Informed Defense Meet AttackIQ Vanguard: Helping security teams identify control gaps before the adversary does. ByCarl Wright September 30, 2021July 31, 2025