Insights & Perspectives

    Don’t treat cybersecurity hygiene like your car engine light

    October 21, 2021
    ESG has just released the key findings of its cybersecurity hygiene and posture management survey, and in a poll of 400 cybersecurity professionals in North American enterprises, the number one action respondents said would improve cybersecurity hygiene? You guessed it: continuous security control validation.
    Read More

    What To Do in the Case of Brand Reputation Impersonation

    October 15, 2021
    Recently, AttackIQ was notified that an Iranian threat actor had created a fake domain and fraudulent website (attackiq[.]ir) impersonating AttackIQ and abusing the company brand. This blog is an account of what happened and how AttackIQ responded, and it aims to provide insights to help organizations prepare to deal with similar Brand Reputation Abuse situations.
    Read More

    “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works.

    October 4, 2021
    To echo a famous Russian proverb, “trust but verify,” it’s not enough to implement a zero trust architecture. Continuous testing is the only way to achieve real cybersecurity readiness.
    Read More

    Is Your Healthcare Organization Following These Four Ransomware Best Practices?

    August 24, 2021
    Healthcare is the most targeted sector for data breaches, and ransomware attacks were responsible for almost 50 percent of all healthcare data breaches in 2020. How should healthcare companies proceed? Our guest blogger in this ransomware series is Tracy Cohen, a cybersecurity expert with over a decade of experience managing cybersecurity risk in the healthcare and biopharma sector. She is also a licensed skydiver,
    Read More

    Standing Up for Our Principles: AttackIQ Signs the Respect In Security

    August 16, 2021
    Read More

    Teamwork Making the Dream Work!

    August 13, 2021
    Why I’m Particularly Proud AttackIQ Made the 2021 Fortune Great Place to Work List
    Read More

    Healthcare Under Siege: Should Hospitals Pay Hackers Ransom?

    August 9, 2021
    In 2020, three of the top 10 most searched terms were, unsurprisingly, healthcare-related. (Coronavirus, coronavirus update, coronavirus symptoms.) We’ve never been so attuned to what’s happening in our healthcare systems and hospitals.
    Read More

    Purple Teaming for Cybersecurity Effectiveness: 10 Lessons

    July 29, 2021
    How do you improve your security posture by standing up a purple team strategy? Here are 10 important things to keep in mind from the Purple Teaming for Dummies eBook.
    Read More

    How purple team operations helped defend the Pentagon — and can help your security team today.

    July 16, 2021
    The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
    Read More

    How to Pitch Your CFO on Automated Security Control Validation

    July 9, 2021
    CFOs are often perceived as gatekeepers to the company’s cash coffers. With different functional leaders vying for project investments, it is true that the role of the CFO is to help prioritize the company’s spend, based on the business growth plan and trajectory.
    Read More

    Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness

    June 24, 2021
    This past week, AttackIQ launched its inaugural Purple Hats Conference—where more than 3,000 cybersecurity practitioners, partners, and pros joined to collaborate, share ideas, and learn how to evolve from a reactive to proactive threat informed defense strategy.
    Read More

    10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy

    June 22, 2021
    There are a number of ways that the MITRE ATT&CK framework can be used in your cybersecurity practice. Here are 10 of the most important as laid out in the MITRE ATT&CK for Dummies eBook.
    Read More

    Risky Business #624 — AttackIQ’s Mark Bagley and Jonathan Reiber talk with Patrick Gray of Risky Biz about how to solve the ransomware problem

    May 19, 2021
    Read More

    AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

    April 26, 2021
    The goal is greater visibility and effectiveness.
    Read More

    The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

    April 9, 2021
    In advance of the new Biden administration cybersecurity executive order, it’s time for the federal government to get proactive about cybersecurity. Deploying a validated zero trust architecture for the U.S. government’s most critical high-value assets is an aggressive but achievable goal.
    Read More

    Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay

    April 6, 2021
    Read More

    A Next Step “On The Road” (to Security Optimization)

    March 23, 2021
    AttackIQ’s new architecture upgrade makes it possible for customers to emulate comprehensive, multi-stage adversary cyberattack campaigns with realism and specificity, at every step in the kill chain. Check it out.
    Read More

    Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

    February 16, 2021
    Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities’ ability to detect and prevent image-based malware. Read on to learn how it works – and how you can obfuscate data on your own to test your defenses.
    Read More

    GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools

    February 8, 2021
    AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls that prevent adversaries from moving laterally across a network, as in the case of SolarWinds.
    Read More

    AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity

    January 12, 2021
    Read More

    Lions and Tigers and a December Full of Adversary Activity – Oh My!

    December 23, 2020
    Defensive technologies can provide meaningful capabilities to isolate the adversary from compromised systems as defenders and threat hunters inspect their networks, preventing further reconnaissance and lateral movement, but only if their effectiveness is tested and validated.
    Read More

    “In God we trust. All others must bring data.”

    December 16, 2020
    Read More

    Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation

    December 15, 2020
    The alignment of NIST 800-53 and MITRE ATT&CK creates a unique opportunity for red, blue, and white teams to understand each other—and how they can work together to build a fully compliant and mature cybersecurity program.
    Read More

    Innovating During COVID-19 to Improve Security Effectiveness

    December 1, 2020
    Read More