Homepage
Open in app
Sign in
Get started
MITRE-Engenuity
A Foundation for Public Good
Follow
Threat-Informed Defense to Secure AI
Threat-Informed Defense to Secure AI
Written by Tabitha Colter, Shiri Bendelac, Lily Wong, Christina Liaghati, & Keith Manville
Mike Cunningham
Sep 30
Know your Adversary’s next move with TIE
Know your Adversary’s next move with TIE
Written by James Ross.
Mike Cunningham
Sep 9
Exploring the Frontier: Insights from ATT&CK Evaluations Managed Services Round 2
Exploring the Frontier: Insights from ATT&CK Evaluations Managed Services Round 2
Detection Analysis of Reflective Code Loading used in Managed Services Round 2
Lex Crumpton
Aug 20
Guarding the Grid: Defending Operational Technology with ATT&CK
Guarding the Grid: Defending Operational Technology with ATT&CK
identify and defend against adversarial techniques that impact operations on critical infrastructure
Mike Cunningham
Aug 14
Industry Leaders Expand Threat-Informed Defense to AI-Enabled Systems
Industry Leaders Expand Threat-Informed Defense to AI-Enabled Systems
Written by Suneel Sundar.
Jon Baker
Jul 16
Turn Your Threat Model to Supermodel with ATT&CK
Turn Your Threat Model to Supermodel with ATT&CK
Written by Tyler Schechter
Suneel Sundar
Jul 8
Software Security: Now Threat-Informed!
Software Security: Now Threat-Informed!
Written by Mark E. Haase.
Jon Baker
Jun 21
ATT&CK® Evaluations Managed Services (2024): Actionable Insights and the Challenge of Dual…
ATT&CK® Evaluations Managed Services (2024): Actionable Insights and the Challenge of Dual…
We are thrilled to unveil the results from the ATT&CK Evaluations® Managed Services 2024 (Round 2)
Lex Crumpton
Jun 18
Infiltrating Defenses: Abusing VMware in MITRE’s Cyber Intrusion
Infiltrating Defenses: Abusing VMware in MITRE’s Cyber Intrusion
MITRE introduce the notion of a rogue VMs within the Ivanti breach
Lex Crumpton
May 22
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
MITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation network
Lex Crumpton
May 3
About MITRE-Engenuity
Latest Stories
Archive
About Medium
Terms
Privacy
Teams