Breach and Attack Simulation IDC’s Top Insights Around Purple Teaming ByJordan McMahon May 25, 2022July 31, 2025
Adversary Emulation | Cyberattack | Cybersecurity | Russia | TTPs Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA) ByKen Towne March 18, 2022July 22, 2025
Breach and Attack Simulation | Cybersecurity Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021July 31, 2025
TTPs 10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy ByJordan McMahon June 22, 2021July 31, 2025
Threat-Informed Defense Episode 1: APT29 and Threat Informed Defense (Pilot) ByJonathan Reiber July 28, 2020July 31, 2025
Cyberattack | TTPs Purple Teaming Chronicles II: Red-Team Augmentation BySergi Martinez June 30, 2020July 31, 2025
Adversary Emulation | Security Controls Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command ByJonathan Reiber May 15, 2020July 31, 2025