Insights & Perspectives IDC’s Top Insights Around Purple Teaming ByJordan McMahon May 25, 2022January 14, 2026
Threat Advisories Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA) ByKen Towne March 18, 2022January 14, 2026
Insights & Perspectives Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021January 14, 2026
Insights & Perspectives 10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy ByJordan McMahon June 22, 2021January 14, 2026
Threat Research Episode 1: APT29 and Threat Informed Defense (Pilot) ByJonathan Reiber July 28, 2020January 14, 2026
Threat Research Purple Teaming Chronicles II: Red-Team Augmentation BySergi Martinez June 30, 2020January 14, 2026
Insights & Perspectives Purple Teaming Chronicles Part 1 BySergi Martinez May 22, 2020January 14, 2026
Insights & Perspectives Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command ByJonathan Reiber May 15, 2020January 14, 2026