Archive
Purple Gain: Using Red Team, Blue Team Solutions and Strategies to Provide Preferred Cybersecurity Outcomes
Businesses in the pursuit of protecting their data and networks buy tools to create a defense-in-depth cybersecurity posture. The thinking is well-intended but is slightly fallacious.
CISO’s Guide to Using Attack Graphs and MITRE ATT&CK
How do you construct an attack sequence that maps detection and mitigation actions to protect your business? Find out in this guide
IDC’s take on Breach and Attack Simulation
Read IDC’s interview summaries with 9 companies providing a range of BAS capabilities—an increasingly crucial part of security services.
Uncategorized
The CISO’s Guide to MITRE ATT&CK® for the Financial Services Sector
How to build a program of threat-informed defense in an industry under regular cyberattack.
Uncategorized
Six Success Tips for New CISOs
New CISO? We've pulled together six tips to help you jumpstart your new role.
Uncategorized
The CISO’s Guide to Better Vulnerability Management Using MITRE ATT&CK®
This guide is meant to help CISO's understand how to prioritize which vulnerabilities to fix first.
Uncategorized
The CISO’s Guide to Cloud Security Using ATT&CK
This guide will help you to achieve cloud security readiness through continuous security control validation with ATT&CK.
Uncategorized
The CISO’s Guide to Cybersecurity Readiness
Are you ready for your next cyber attack? This guide walks through the key things that CISO’s need to ensure optimal readiness.
1
/
2