Purple Gain: Using Red Team, Blue Team Solutions and Strategies to Provide Preferred Cybersecurity Outcomes
Businesses in the pursuit of protecting their data and networks buy tools to create a defense-in-depth cybersecurity posture. The thinking is well-intended but is slightly fallacious.
CISO’s Guide to Using Attack Graphs and MITRE ATT&CK
How do you construct an attack sequence that maps detection and mitigation actions to protect your business? Find out in this guide
IDC’s take on Breach and Attack Simulation
Read IDC’s interview summaries with 9 companies providing a range of BAS capabilities—an increasingly crucial part of security services.
The CISO’s Guide to MITRE ATT&CK® for the Financial Services Sector
How to build a program of threat-informed defense in an industry under regular cyberattack.
The CISO’s Guide to Better Vulnerability Management Using MITRE ATT&CK®
This guide is meant to help CISO's understand how to prioritize which vulnerabilities to fix first.
1 / 2