How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
The post How purple team operations helped defend the Pentagon — and can help your security team today. appea… Continue reading How purple team operations helped defend the Pentagon — and can help your security team today.

AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

The goal is greater visibility and effectiveness.
The post AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. appeared first on AttackIQ.
The post AttackIQ and MITRE Engen… Continue reading AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

In advance of the new Biden administration cybersecurity executive order, it’s time for the federal government to get proactive about cybersecurity. Deploying a validated zero trust architecture for the U.S. government’s most critical high-value asset… Continue reading The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuP… Continue reading In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile.
The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right appeared first on AttackIQ.
The … Continue reading If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Five Accelerating Digital Trends That Will Impact Risk Management in 2021

Digital risks escalated in 2020 under the onset of the novel coronavirus and shaped the cybersecurity policy landscape. Over the coming year, we can surmise five accelerating digital trends that will continue to exert their impact on security and human… Continue reading Five Accelerating Digital Trends That Will Impact Risk Management in 2021

This election year, the health of the Union depends on how we safeguard our information 

Cybersecurity does not exist in a vacuum and current socio-economic pressures make the United States more vulnerable to cyberattacks of all kinds. With the U.S. presidential election underway, Americans need to take practical steps to defend our democr… Continue reading This election year, the health of the Union depends on how we safeguard our information