Dive deeper into research, use cases, articles and AttackIQ news. Explore our curated collection of on demand webinars and podcasts to learn more.
Efficiently Assessing Cybersecurity Risk Across a Leading National Bank’s People, Processes, and Technology
AttackIQ Provides Vital Security Control Validation and Strategic Decision Support in Health-Sector Organizations
In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass
After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuPass, you can see security failures, make data-informed adjustments, and plan smart investments to optimize your security. Check out the new emulation plan from MITRE Engenuity's Center for Threat-Informed Defense and AttackIQ.
Data Obfuscation: An Image Is Worth a Thousand Lines of Malware
Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities' ability to detect and prevent image-based malware. Read on to learn how it works – and how you can obfuscate data on your own to test your defenses.
GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools
AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls that prevent adversaries from moving laterally across a network, as in the case of SolarWinds.