MITRE System of Trust identifies and quantifies supply chain security risks

At RSA 2022 Conference, MITRE unveild its new “System of Trust,” a framework to provide a comprehensive, community-driven, knowledge base of supply chain security risks and a customizable, security-risk assessment process for use by any organization wi… Continue reading MITRE System of Trust identifies and quantifies supply chain security risks

MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

The MITRE ATT&CK threat framework is seemingly everywhere these days, and with good reason. It is an invaluable tool for understanding the various methods, or as MITRE refers to them Tactics and Techniques, employed by threat actors. It offers annotated and curated details about those methods, and it provides the capability to visualize this data […]

The post MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be? appeared first on Security Intelligence.

Continue reading MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Six trillion dollars. That’s how much global cybercrime cost the world’s economy in 2021, according to Cybersecurity Ventures. In an effort to take a bite out of that number, the Center for Internet Security (CIS) is committed to validating… Continue reading Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

MITRE Engage framework provides defense strategies for the cyber defense community

MITRE launched MITRE Engage, a framework for communicating and planning cyber adversary engagement, deception, and denial activities. Informed by adversary behavior observed in the real world, Engage helps chief information security officers (CISOs), c… Continue reading MITRE Engage framework provides defense strategies for the cyber defense community

How to improve threat detection in ICS environments

A challenge in industrial control systems (ICS) cybersecurity is the lack of detection and collection capability within most ICS environments. Security leaders can struggle to piece together the complete attack chain in actual ICS incidents because the environments cannot collect the required evidence. A new report, “2021 MITRE Engenuity ATT&CK Evaluations for ICS,” produced by Dragos, evaluates the ICS threat detection market and shows a realistic demonstration of an attack against an operational technology environment. This report details the purpose of the ATT&CK evaluations for ICS and the lessons learned from the evaluation results, including: How the MITRE ATT&CK for ICS framework was developed A breakdown of the ATT&CK Evaluations for the ICS scenario, including the emulated attack approach and the ICS environment The ATT&CK Evals results and how Dragos performed Benefits to the ICS cybersecurity community Learn more on the ATT&CK Evaluations and how to accelerate digital transformation securely to manage growing risks to protect core business operations. This article was produced by CyberScoop […]

The post How to improve threat detection in ICS environments appeared first on CyberScoop.

Continue reading How to improve threat detection in ICS environments

Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Continue reading Intelligent Adversary Engagement: Deceiving the Attacker