Published inCenter for Threat-Informed DefenseStrengthening the Connection: VERIS and MITRE ATT&CK®Written by Tiffany Bergeron and Ingrid SkoogApr 6, 2023Apr 6, 2023
Published inCenter for Threat-Informed DefenseNext Stop for TRAMExploring the Application of Large Language ModelsMar 29, 20231Mar 29, 20231
Published inCenter for Threat-Informed DefenseDefending Infrastructure-as-a-Service with ATT&CK®Written by James Ross and Adrian Garcia GonzalezNov 17, 2022Nov 17, 2022
Published inCenter for Threat-Informed DefenseAttack Flow — Make Threat-Informed Decisions Based on Steps in a Cyber-AttackWritten by Ross Weisman, Mark E. Haase, and Ingrid SkoogOct 27, 2022Oct 27, 2022
Published inCenter for Threat-Informed DefenseAhhh, This Emulation is Just Right: Introducing Micro Emulation PlansWritten by Mike Cunningham and Jamie WilliamsSep 15, 20221Sep 15, 20221
Published inCenter for Threat-Informed DefenseResearch Partnership explores Cloud AnalyticsWritten by Dr. Desiree Beck, Michael Butt, and Ingrid SkoogJul 28, 2022Jul 28, 2022
Published inCenter for Threat-Informed DefenseGoogle Cloud Platform Capabilities Mapped to MITRE ATT&CK®Written by Jon Baker, James Ross, and Tiffany Bergeron.Jun 27, 2022Jun 27, 2022
Published inCenter for Threat-Informed DefensePut MITRE ATT&CK® at Your FingertipsWritten by Mark E. Haase and Jon Baker.Jun 25, 20224Jun 25, 20224