MITRE ATT&CK | Ransomware | Threat-informed defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Malware | Russia Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Center for Threat-Informed Defense | Cyberattack | Machine Learning | Threat-informed defense | TTPs Testing with Realism: Attack Flows and AttackIQ Attack Graphs ByJonathan Reiber March 11, 2022
Adversary Emulation | Russia | Security Control Validation | US-CERT Alert Response Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022July 22, 2025
Cybersecurity The Center for Threat-Informed Defense: Impacting the Public Good ByCarl Wright February 9, 2022
Vulnerability Research Compliance and Cyber Security Risk Reduction Don’t have to be Enemies ByTim Morgan February 8, 2022
Center for Threat-Informed Defense | Cybersecurity Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation. ByJonathan Reiber October 29, 2021
Adversary Emulation | Cybersecurity “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021
Center for Threat-Informed Defense | Cloud Security Cloud platforms can stop adversaries. Here’s how. ByJonathan Reiber September 22, 2021
Cybersecurity | Ransomware Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021
Cybersecurity How purple team operations helped defend the Pentagon — and can help your security team today. ByJonathan Reiber July 16, 2021