Assessing & Mapping Security Tool Capabilities to the ATT&CK Matrix

Cybersecurity Capstone — Part Three

image by author

This article is part of my capstone blogging series, which will detail my project as I progress. For the list of all articles, visit my Cybersecurity Master’s Capstone list. Additionally, in this post and future ones, I’ll refer to the companies I’m analyzing as Company A, B, C, and so on

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Katlyn Gallo

Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | https://ktgblogs.com | Find me on Twitter & Instagram: @ktgblogstech