Dive deeper into research, use cases, articles and AttackIQ news. Explore our curated collection of on demand webinars and podcasts to learn more.
How purple team operations helped defend the Pentagon — and can help your security team today.
The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided
On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how the attack happened, how attack emulation could have helped, and what you can do to implement a threat-informed defense strategy to prepare yourself for similar threat actor behavior.
AttackIQ Announces $44 Million in Series C Funding to Fuel Global Growth and Vision of Security Optimization
Led by Atlantic Bridge, the investment also included new investors Saudi Aramco Energy Ventures (SAEV) and Gaingels, with participation from…
How to Pitch Your CFO on Automated Security Control Validation
CFOs are often perceived as gatekeepers to the company’s cash coffers. With different functional leaders vying for project investments, it is true that the role of the CFO is to help prioritize the company’s spend, based on the business growth plan and trajectory.
Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness
This past week, AttackIQ launched its inaugural Purple Hats Conference—where more than 3,000 cybersecurity practitioners, partners, and pros joined to collaborate, share ideas, and learn how to evolve from a reactive to proactive threat informed defense strategy.
Put MITRE ATT&CK® to work through Workbench
For years, users struggled to put MITRE ATT&CK into practice. With the release of ATT&CK Workbench today, defenders can far better ensure that their threat intelligence is continually aligned with the public ATT&CK knowledge base. See how and why.
10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy
There are a number of ways MITRE ATT&CK can be used in your cybersecurity practice. Here are 10 of the most important as laid out in the MITRE ATT&CK for Dummies eBook.