Dive deeper into research, use cases, articles and AttackIQ news. Explore our curated collection of on demand webinars and podcasts to learn more.
Channel 4’s The Undeclared War: Cyber Fact or TV Fiction?
Ross Brewer, Technical Director of EMEA for AttackIQ has worked in cybersecurity for over 30 years, and comments on the hit Channel 4 drama.
Security experts are bracing for major cyberattacks
In response to strong sanctions and military aid to Ukraine, Russia was expected to launch disruptive cyberattacks against the West but never did. But a cyberescalation from Russia still remains possible, as soon as later this year, according to experts.
The Best Form of Defense
Why it’s time to change tack in cybersecurity and replace Fear, Uncertainty and Doubt with an evidence-based, data-driven approach
Case Study: ESED
Learn how a Spanish MSSP, leverages AttackIQ to provide customers with better insights and validate security control effectiveness
AttackIQ CEO Reveals How to Achieve an Assume Breach Mindset
Brett Galloway, CEO of AttackIQ, joined The Tech Talks Daily Podcast to discuss how security leaders can build a comprehensive defense-in-depth strategy to confidently report to their boards, auditors, and leadership teams the strength of their security posture.
Purple Gain: Using Red Team, Blue Team Solutions and Strategies to Provide Preferred Cybersecurity Outcomes
Businesses in the pursuit of protecting their data and networks buy tools to create a defense-in-depth cybersecurity posture. The thinking is well-intended but is slightly fallacious.
Ransomware and criminal cyberthreats: How to counter using MITRE ATT&CK
Find out how to use a threat-informed defense approach to cyber security with MITRE ATT&CK
BBC Issues Cyber Attack Warning: Watch the Interview
BBC explores cybersecurity risks facing Ukraine, and how the country narrowly avoided a critical infrastructure attack.
Attack Graph Response to US-CERT AA22-108A: North Korean Targeting of Blockchain Companies
Evaluate security controls, assess your security posture, and validate prevention against APT38
Kellog Community College recovered quickly post-ransomware attack. Could you?
Get a real-world look at how an educational organization reacted and responded to threat actor behavior.