Center for Threat-Informed Defense | Cybersecurity Education | MITRE ATT&CK | Threat-Informed Defense How to Test Your Defenses Against Personalized Top 10 MITRE ATT&CK Techniques ByJordan McMahon August 4, 2022July 31, 2025
Adversary Emulation | Breach and Attack Simulation | MITRE ATT&CK Leveraging the MITRE ATT&CK framework to build a threat-informed defense ByAttackIQ Team July 29, 2022
Ransomware | Threat-Informed Defense The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021July 31, 2025
TTPs 10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy ByJordan McMahon June 22, 2021July 31, 2025
Cybersecurity Education Building a Stronger Community for Threat Informed Defense ByCarl Wright May 25, 2021July 31, 2025
Threat-Informed Defense Episode 3: Best Practices in Threat-Informed Defense ByJonathan Reiber August 1, 2020July 31, 2025
Threat-Informed Defense Episode 1: APT29 and Threat Informed Defense (Pilot) ByJonathan Reiber July 28, 2020July 31, 2025