Pietro Romano / SecBeret[CyberSec] Creating Detection Rules Based on MITRE ATT&CK in Splunk SIEMLeveraging External Resources for Enhanced Threat Detection2d ago
InSecurityBreakbyThomas Roccia6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 202210
InMITRE-EngenuitybySuneel SundarShare the How2024 Center for Threat-Informed Defense R&D Roadmap Update — Part TwoNov 22Nov 22
ValerieTafurMITRE [TryHackMe]This room will discuss the various resources MITRE has made available for the cybersecurity community.Jun 13, 20231Jun 13, 20231
Pietro Romano / SecBeret[CyberSec] Creating Detection Rules Based on MITRE ATT&CK in Splunk SIEMLeveraging External Resources for Enhanced Threat Detection2d ago
InSecurityBreakbyThomas Roccia6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 202210
InMITRE-EngenuitybySuneel SundarShare the How2024 Center for Threat-Informed Defense R&D Roadmap Update — Part TwoNov 22
ValerieTafurMITRE [TryHackMe]This room will discuss the various resources MITRE has made available for the cybersecurity community.Jun 13, 20231
RocketMe Up CybersecurityThreat Modelling Process in Cybersecurity — A Comprehensive Guide for Modern EnterprisesHow threat modeling safeguards critical systems, highlights vulnerabilities, and strengthens defenses against cyber threats.Nov 21
InInfoSec Write-upsbyAdam GossThe ATT&CK Navigator: A Powerful Tool for Visualizing Cyber AttacksUnlock the power of the ATT&CK Navigator and learn to visualize and map attack techniques through a user-friendly interface.Nov 15
Pietro Romano / SecBeret[CyberSec] Ontology and Taxonomy in CybersecurityUnderstanding the Differences between Ontology and TaxonomyNov 17