Open in app

Sign In

Write

Sign In

Gal Engelberg
Gal Engelberg

15 Followers

Home

About

Published in

Labs Notebook

·Jan 15

How to Automatically Map Application Flaws to MITRE ATT&CK Techniques and D3FEND Countermeasures

Using Neo4J Data Fabric, and NeoSemantics under the hood — Exploits detected in open-source software packages (as log4j) triggered the industry to find a solution to monitor, detect, prevent, and repair vulnerabilities and weaknesses in applications. This need is relevant for whole software development life-cycle, and includes both self-developed or third party software components. …

Graph Data Science

6 min read

How to Automatically Map Application Flaws to MITRE ATT&CK Techniques and D3FEND Countermeasures
How to Automatically Map Application Flaws to MITRE ATT&CK Techniques and D3FEND Countermeasures
Graph Data Science

6 min read

Gal Engelberg

Gal Engelberg

15 Followers

Applied research team lead at Accenture Israel Cyber R&D Lab. My research is about Graph Data Science, Process Mining, and Cybersecurity

Following
  • Adolfo Ramirez-Aristizabal

    Adolfo Ramirez-Aristizabal

  • Mike Kuniavsky

    Mike Kuniavsky

  • Nimrodbusany

    Nimrodbusany

  • Alexandria Pabst

    Alexandria Pabst

  • Typhoonese

    Typhoonese

See all (16)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams