Insights & Perspectives

    Five ways to lock down security control validation

    November 12, 2020
    Simple and important steps to make your cybersecurity program more efficient and effective.
    Read More

    AttackIQ Named one of the 2020 Best Small & Medium Workplaces™ by Great Place to Work® and Fortune

    October 16, 2020
    Read More

    Time to prepare for increased U.S.-China tensions in cyberspace 

    October 5, 2020
    Last week, the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to critical infrastructure owners and operators across the United States to be vigilant for potential Chinese cyberspace operations given heightened tensions between the two countries. What does the CISA alert recommend, and why is it important to follow it? 
    Read More

    This election year, the health of the Union depends in part on how we safeguard our information 

    September 23, 2020
    Cybersecurity does not exist in a vacuum and current socio-economic pressures make the United States more vulnerable to cyberattacks of all kinds. With the U.S. presidential election underway, Americans need to take practical steps to defend our democratic processes, online and off. This essay outlines some of the issues facing the United States in advance of the election, shares insights from AttackIQ’s recent podcast with leaders of Harvard’s Defending Digital Democracy project, and offers specific steps to manage the cybersecurity challenges of this moment.
    Read More

    A historic plan, built for the public.

    September 15, 2020
    Read More

    Episode 4: FIN6 MITRE Emulation Plan

    September 15, 2020
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More

    AttackIQ’s business is not security testing.

    August 3, 2020
    If you know AttackIQ, you probably know us as the leading independent vendor of Breach & Attack Simulation systems. We build the best security control validation solution available. So how is it that I say our business is not security testing?
    Read More

    Episode 2: How to Achieve Cybersecurity Effectiveness

    July 30, 2020
    Read More

    What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers

    July 23, 2020
    Read More

    “Think Bad. Do Good” Podcast Episode 3: Best Practices in Threat-Informed Defense

    July 9, 2020
    Read More

    AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers

    July 7, 2020
    Read More

    “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness

    June 15, 2020
    Read More

    COVID-19 Is Forcing Hard Cybersecurity Choices

    June 15, 2020
    Read More

    Before the Election, States Need to Test their Cybersecurity Continuously

    June 4, 2020
    Read More

    Purple Teaming Chronicles Part 1

    May 22, 2020
    Read More

    2020 Verizon Data Breach Investigations Report: Analysis, Findings, and AttackIQ Commentary

    May 20, 2020
    Read More

    Why I Joined AttackIQ: Compelling Mission, Amazing Team

    May 18, 2020
    Read More

    Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command

    May 15, 2020
    Read More

    Defeating a Cloud Breach Part 3

    April 14, 2020
    Read More

    Defeating a Cloud Breach Part 2

    April 6, 2020
    Read More

    Defeating a Cloud Breach Part 1

    March 30, 2020
    Read More

    
AttackIQ’s Extreme Ownership – Giving Back to Our Community Through Research

    November 18, 2019
    Read More

    Emulating Attacker Activities and The Pyramid of Pain

    June 26, 2019
    Some of you might be familiar with “The Pyramid of Pain”, first introduced in 2013 by security professional David J Bianco when he was focused on incident response and threat hunting for the purpose of improving the applicability of attack indicators.
    Read More