Blog Posts

Center for Threat-Informed Defense

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

By Tiffany Bergeron

February 13, 2025

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.

Continue reading

Stacked Defense from the Hardware Up

By Tiffany Bergeron

January 3, 2025

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.

Continue reading

Summiting the Pyramid: Bring the Pain with Robust and Accurate Detection

By Michaela Adams, Roman Daszczyszak, Steve Luke

December 16, 2024

Summiting the Pyramid (STP) provides a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections against adversary behavior.

Continue reading

The Best Defense is a Security Capability Mapped to ATT&CK

By Tiffany Bergeron

December 13, 2024

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.

Continue reading

Threat-Informed Defense Applies Broadly – 2024 R&D Roadmap Update – Part Three

By Suneel Sundar

November 22, 2024

The third principle for our 2024 research program is Threat-Informed Defense applies broadly. You will find Center projects that apply threat-informed defense to artificial intelligence enabled systems, to hardware, and a variety of platforms.

Continue reading

Share the How – 2024 R&D Roadmap Update – Part Two

By Suneel Sundar

November 22, 2024

Our mission is to advance the state of the art and state of the practice in threat-informed defense globally. To make that transition from art to practice for all defenders, our second principle is Share the how.

Continue reading

Good Work Becomes Better Work – 2024 R&D Roadmap Update – Part One

By Suneel Sundar

November 22, 2024

Threat-informed defense identifies known adversary behavior, relevant to an organization’s threat model, and fosters a community-driven approach to enable an organization to proactively defend, self-assess, and improve defenses against those known threats.

Continue reading