Author: Mark Bagley

    Getting ahead of Log4Shell

    Getting Ahead of Log4Shell-enabled Cyberattacks: New Attack Scenarios and Technical Recommendations

    December 20, 2021
    Read More

    A Next Step “On The Road” (to Security Optimization)

    March 23, 2021
    AttackIQ’s new architecture upgrade makes it possible for customers to emulate comprehensive, multi-stage adversary cyberattack campaigns with realism and specificity, at every step in the kill chain. Check it out.
    Read More

    Lions and Tigers and a December Full of Adversary Activity – Oh My!

    December 23, 2020
    Defensive technologies can provide meaningful capabilities to isolate the adversary from compromised systems as defenders and threat hunters inspect their networks, preventing further reconnaissance and lateral movement, but only if their effectiveness is tested and validated.
    Read More

    Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation

    December 15, 2020
    The alignment of NIST 800-53 and MITRE ATT&CK creates a unique opportunity for red, blue, and white teams to understand each other—and how they can work together to build a fully compliant and mature cybersecurity program.
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More