Ransomware | Threat-informed defense The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021
Adversary Emulation | Ransomware | TTPs Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021
Breach and Attack Simulation | Security Controls AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. ByJonathan Reiber April 26, 2021
Breach and Attack Simulation Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay ByJulie O'Brien April 6, 2021
Center for Threat-Informed Defense In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass ByJonathan Reiber February 23, 2021
Security Controls AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021
Adversary Emulation Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation ByMark Bagley December 15, 2020
Adversary Emulation “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness ByJonathan Reiber June 15, 2020
Adversary Emulation | Security Controls Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command ByJonathan Reiber May 15, 2020