Author: Jonathan Reiber

    Democratizing the Practice of Adversary Emulation

    February 14, 2023
    AttackIQ is democratiziing the practice of threat-informed defense and adversary emulation, including by funding research from the Center for Threat-Informed Defense on micro-emulation planning. Learn more out how we put adversary emulation into practice in the AttackIQ Security Optimization Platform.
    Read More

    Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing.

    December 13, 2022
    OpenAI’s ChatGPT can tell you exactly how to use BAS to improve your cyberdefense effectiveness. But it won’t help you with the Russian military specifically, and that’s a very good thing. See below for why OpenAI deserves credit for this algorithmic limit.
    Read More

    A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT

    December 12, 2022
    We asked OpenAI’s ChaptGPT to write a 750-800 word blog post about breach and attack simulation (BAS) in the voice of Langston Hughes. It did great; see below. And well-done, team OpenAI. 
    Read More
    Ash Carter

    The Lessons Ash Carter Taught Me

    October 31, 2022
    One of Ash Carter’s former speechwriters and special assistants reflects on the lessons the Secretary of Defense leaves behind.
    Read More

    Testing with Realism: Attack Flows and AttackIQ Attack Graphs  

    March 11, 2022
    AttackIQ and the Center for Threat-Informed Defense are furthering the art of adversary emulation with the Center’s new Attack Flow project. Building on our deep research partnership with the Center, AttackIQ’s Attack Graphs emulate the adversary with specificity and realism to test advanced cyberdefense technologies against multi-stage attacks. Read on for more.
    Read More

    The trick to handling ransomware: prepare  

    January 19, 2022
    Ransomware is a vexing challenge and attacks have doubled since 2020, but there is a path out of the problem. In this new guide, Countering Ransomware with MITRE ATT&CK, AttackIQ outlines clear, practical steps to test and validate that your security program performs against ransomware. The trick is to prepare, and the path to follow is a threat-informed defense. Check it out and come join us for a technical demonstration of our ransomware capabilities on January 27.
    Read More
    Log4Shell

    Validate Your Cyberdefenses against Log4Shell with MITRE ATT&CK®

    December 13, 2021
    This article focuses on helping organizations to assess the effectiveness of their compensating controls, enable a threat-informed defense with breach and attack simulation plus the MITRE ATT&CK framework, and interdict the adversary post-breach to drive down risk.
    Read More
    CVE + Att&ck

    Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation.

    October 29, 2021
    Read More

    “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works.

    October 4, 2021
    To echo a famous Russian proverb, “trust but verify,” it’s not enough to implement a zero trust architecture. Continuous testing is the only way to achieve real cybersecurity readiness.
    Read More

    Cloud platforms can stop adversaries. Here’s how. 

    September 22, 2021
    A landmark innovation from MITRE Engenuity’s Center for Threat-Informed Defense maps cloud security controls in AWS and Azure to MITRE ATT&CK®, elevating cybersecurity effectiveness.
    Read More

    How purple team operations helped defend the Pentagon — and can help your security team today.

    July 16, 2021
    The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
    Read More

    AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

    April 26, 2021
    The goal is greater visibility and effectiveness.
    Read More