Security Controls

    OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns

    July 11, 2022
    AttackIQ has released two new attack graphs that emulate different aspects of OilRig’s operations against multiple sectors around the globe. With these attack graphs, you can test and validate your defenses to improve cybersecurity readiness.
    Read More

    Integrations – Vectra

    April 18, 2022
    AttackIQ has released a new integration for use with network based scenarios. This blog describes use cases, scenarios one can utilize and what indicators we look for when determining a match.
    Read More
    Getting ahead of Log4Shell

    Getting Ahead of Log4Shell-enabled Cyberattacks: New Attack Scenarios and Technical Recommendations

    December 20, 2021
    Read More

    AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

    April 26, 2021
    The goal is greater visibility and effectiveness.
    Read More

    The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

    April 9, 2021
    In advance of the new Biden administration cybersecurity executive order, it’s time for the federal government to get proactive about cybersecurity. Deploying a validated zero trust architecture for the U.S. government’s most critical high-value assets is an aggressive but achievable goal.
    Read More

    Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

    February 16, 2021
    Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities’ ability to detect and prevent image-based malware. Read on to learn how it works – and how you can obfuscate data on your own to test your defenses.
    Read More

    GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools

    February 8, 2021
    AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls that prevent adversaries from moving laterally across a network, as in the case of SolarWinds.
    Read More

    AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity

    January 12, 2021
    Read More

    Five ways to lock down security control validation

    November 12, 2020
    Simple and important steps to make your cybersecurity program more efficient and effective.
    Read More

    AttackIQ Named one of the 2020 Best Small & Medium Workplaces™ by Great Place to Work® and Fortune

    October 16, 2020
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More

    “Think Bad. Do Good” Podcast Episode 3: Best Practices in Threat-Informed Defense

    July 9, 2020
    Read More