Dive deeper into research, use cases, articles and AttackIQ news. Explore our curated collection of on demand webinars and podcasts to learn more.
Ransomware and criminal cyberthreats: How to counter using MITRE ATT&CK
Find out how to use a threat-informed defense approach to cyber security with MITRE ATT&CK
BBC Issues Cyber Attack Warning: Watch the Interview
BBC explores cybersecurity risks facing Ukraine, and how the country narrowly avoided a critical infrastructure attack.
Attack Graph Response to US-CERT AA22-108A: North Korean Targeting of Blockchain Companies
Evaluate security controls, assess your security posture, and validate prevention against APT38
Kellog Community College recovered quickly post-ransomware attack. Could you?
Get a real-world look at how an educational organization reacted and responded to threat actor behavior.
Hot takes on today’s critical cybersecurity topics
Hear Attack IQ VP of Cybersecurity Strategy and Policy Jonathan Reiber talk through cybersecurity concerns at an international level
How is the role of the CISO evolving?
This Professional Security Magazine article explores issues for today's CISOs and how a threat-informed defense can help.
Hacking Your Security Behaviors: CISOs Share Best Practices
Dig into four tips from some of the world’s leading CISOs for successfully navigating cybersecurity challenges.
Cloud Security with MITRE ATT&CK® For Dummies
Take practical steps to deploy ATT&CK as a framework to maximize your cloud security effectiveness—this guide will tell you how.
Biden Warns of New Cyberattacks | Ross Brewer on Bloomberg US
Hear what organizations can be doing better to lock their digital doors, especially in the wake of new criminal cyberthreats
AttackIQ Announces Integration with Vectra AI Threat Detection and Response Platform to Help Customers Optimize their Security Control Effectiveness
SANTA CLARA, Calif.—April 20, 2022—AttackIQ®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced a…
A look at the AttackIQ and Vectra AI integration
This blog describes use cases, scenarios you can utilize, and what indicators we look for when determining a match.
5 Reasons You Don’t Want to Miss Purple Hats Conference 2022
The Purple Hats Conference brings thousands of cybersecurity pros together annually. Find out what you can learn attending live or on demand!
Adopting a Threat-Informed Defense (with Christopher Frenz)
In this episode, Christopher and Jonathan talk zero-trust security & building an evidence-based security program via threat-informed defense
Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector
See how to test and validate their cyberdefense effectiveness against the HAVEX strain of malware.
CISO’s Guide to Using Attack Graphs and MITRE ATT&CK
How do you construct an attack sequence that maps detection and mitigation actions to protect your business? Find out in this guide