Tracking Image
Background image

Blog

Stay updated on recent news and the latest industry trends, and read expert commentary written by the AttackIQ team.

Rising Above the Noise at RSA

RSA 2019 was an incredible conference for AttackIQ. We had many reasons to be excited, as this year we celebrate the 5th Anniversary of AttackIQ and yet the first time we had a booth on the show floor! We commemorated these milestones with an incredible booth display to demo our platform, numerous technical partnerships to announce and our new CEO, Brett Galloway leading the way! I couldn't have been more proud of AttackIQ as one of its co-founders.

Read More

Tips for RSA 2019

I have been attending RSA for more than 15 years. It's an intense, long week but a rare opportunity to meet with many strategic security leaders and professionals all in one concentrated location. It can be very productive if planned right. Here are a few tips that have helped make my time worthwhile at RSA over the years.

Read More

Is your Gold Disk putting you At Risk?
If your environment security testing plan does not start with your “gold disk,” there is a chance that you are actually introducing new attack surfaces with every new gold disk image that you deploy on your network.

Read More

Automated Query Engine: Full scenario coverage, no need to write queries

Our latest Integrations update includes a new approach which makes it easy for FireDrill customers to enable detection of scenario executions. A smart query feature for all FireDrill integrations.

Read More

MITRE ATT&CK Module

Enterprise security teams are faced with a growing problem. Advanced adversaries are winning the war, stealing data at will and wreaking havoc on corporate networks.

Read More

AttackIQ New Product Feature - Cyber Hunt Exercise Module

AttackIQ is pleased to announce the release of our Cyber Hunt Exercise Module; a new workflow within FireDrill that enables customers to validate and measure the detection and response capabilities of their Detection Analysts.

Read More

Application Whitelist Bypass

Application whitelisting is a common technique used to prevent execution of unknown or potentially malicious applications. However, this technique can be bypassed if not implemented correctly.

Read More

Bypassing UAC using Registry Keys
User Account Control (UAC) is a Windows feature that helps to prevent unauthorized changes to the system.

Read More