Author: Jonathan Reiber

    Democratizing the Practice of Adversary Emulation

    February 14, 2023
    AttackIQ is democratiziing the practice of threat-informed defense and adversary emulation, including by funding research from the Center for Threat-Informed Defense on micro-emulation planning. Learn more out how we put adversary emulation into practice in the AttackIQ Security Optimization Platform.
    Read More

    Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing.

    December 13, 2022
    OpenAI’s ChatGPT can tell you exactly how to use BAS to improve your cyberdefense effectiveness. But it won’t help you with the Russian military specifically, and that’s a very good thing. See below for why OpenAI deserves credit for this algorithmic limit.
    Read More

    A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT

    December 12, 2022
    We asked OpenAI’s ChaptGPT to write a 750-800 word blog post about breach and attack simulation (BAS) in the voice of Langston Hughes. It did great; see below. And well-done, team OpenAI. 
    Read More
    Ash Carter

    The Lessons Ash Carter Taught Me

    October 31, 2022
    One of Ash Carter’s former speechwriters and special assistants reflects on the lessons the Secretary of Defense leaves behind.
    Read More

    Testing with Realism: Attack Flows and AttackIQ Attack Graphs  

    March 11, 2022
    AttackIQ and the Center for Threat-Informed Defense are furthering the art of adversary emulation with the Center’s new Attack Flow project. Building on our deep research partnership with the Center, AttackIQ’s Attack Graphs emulate the adversary with specificity and realism to test advanced cyberdefense technologies against multi-stage attacks. Read on for more.
    Read More

    The trick to handling ransomware: prepare  

    January 19, 2022
    Ransomware is a vexing challenge and attacks have doubled since 2020, but there is a path out of the problem. In this new guide, Countering Ransomware with MITRE ATT&CK, AttackIQ outlines clear, practical steps to test and validate that your security program performs against ransomware. The trick is to prepare, and the path to follow is a threat-informed defense. Check it out and come join us for a technical demonstration of our ransomware capabilities on January 27.
    Read More
    Log4Shell

    Validate Your Cyberdefenses against Log4Shell with MITRE ATT&CK®

    December 13, 2021
    This article focuses on helping organizations to assess the effectiveness of their compensating controls, enable a threat-informed defense with breach and attack simulation plus the MITRE ATT&CK framework, and interdict the adversary post-breach to drive down risk.
    Read More
    CVE + Att&ck

    Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation.

    October 29, 2021
    Read More

    “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works.

    October 4, 2021
    To echo a famous Russian proverb, “trust but verify,” it’s not enough to implement a zero trust architecture. Continuous testing is the only way to achieve real cybersecurity readiness.
    Read More

    Cloud platforms can stop adversaries. Here’s how. 

    September 22, 2021
    A landmark innovation from MITRE Engenuity’s Center for Threat-Informed Defense maps cloud security controls in AWS and Azure to MITRE ATT&CK®, elevating cybersecurity effectiveness.
    Read More

    How purple team operations helped defend the Pentagon — and can help your security team today.

    July 16, 2021
    The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
    Read More

    AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

    April 26, 2021
    The goal is greater visibility and effectiveness.
    Read More

    The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

    April 9, 2021
    In advance of the new Biden administration cybersecurity executive order, it’s time for the federal government to get proactive about cybersecurity. Deploying a validated zero trust architecture for the U.S. government’s most critical high-value assets is an aggressive but achievable goal.
    Read More

    In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

    February 23, 2021
    After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuPass, you can see security failures, make data-informed adjustments, and plan smart investments to optimize your security. Check out the new emulation plan from MITRE Engenuity’s Center for Threat-Informed Defense and AttackIQ.
    Read More

    “In God we trust. All others must bring data.”

    December 16, 2020
    Read More

    Time to prepare for increased U.S.-China tensions in cyberspace 

    October 5, 2020
    Last week, the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to critical infrastructure owners and operators across the United States to be vigilant for potential Chinese cyberspace operations given heightened tensions between the two countries. What does the CISA alert recommend, and why is it important to follow it? 
    Read More

    This election year, the health of the Union depends in part on how we safeguard our information 

    September 23, 2020
    Cybersecurity does not exist in a vacuum and current socio-economic pressures make the United States more vulnerable to cyberattacks of all kinds. With the U.S. presidential election underway, Americans need to take practical steps to defend our democratic processes, online and off. This essay outlines some of the issues facing the United States in advance of the election, shares insights from AttackIQ’s recent podcast with leaders of Harvard’s Defending Digital Democracy project, and offers specific steps to manage the cybersecurity challenges of this moment.
    Read More

    Episode 4: FIN6 MITRE Emulation Plan

    September 15, 2020
    Read More

    Episode 3: Best Practices in Threat-Informed Defense

    August 1, 2020
    Read More

    Episode 2: How to Achieve Cybersecurity Effectiveness

    July 30, 2020
    Read More

    Episode 1: APT29 and Threat Informed Defense (Pilot)

    July 28, 2020
    Read More

    “Think Bad. Do Good” Podcast Episode 3: Best Practices in Threat-Informed Defense

    July 9, 2020
    Read More

    AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers

    July 7, 2020
    Read More

    “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness

    June 15, 2020
    Read More