Blog Posts

Center for Threat-Informed Defense

Ambiguous Techniques: Determine Malice through Context

By Antonia Feffer

May 13, 2025

An ambiguous technique is a MITRE ATT&CK® technique whose observable characteristics are insufficient to determine intent. This means that the observable data does not allow us to confidently ascertain whether the intent…

Continue reading

Fight Fraud with Threat-Informed Defense

By Suneel Sundar

May 10, 2025

In 2025, the Center for Threat-Informed Defense will develop the Fight Financial Fraud (F3) framework of tactics, techniques, and procedures (TTPs) used by fraud actors. The F3 framework may include new techniques that characterize known fraud TTPs. It will reference and refine existing ATT&CK …

Continue reading

Secure AI with Threat-Informed Defense

By Suneel Sundar

May 9, 2025

The Center for Threat-Informed Defense applies a threat-informed approach to AI security that enables rapid exchange of new threat information, develops approaches to emulating those threats, and provides comprehensive and effective mitigation strategies.

Continue reading

Threat-Informed Defense is a Mindset, Not a Technique

By Suneel Sundar

April 22, 2025

The Center for Threat-Informed Defense has published the results of three new projects so far in 2025, as well as three updates within the corpus of Security Capability Mappings. Within the Center, our most impactful work comes from enabling efficiency and innovation across the industry, and we do …

Continue reading

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

By Tiffany Bergeron

February 13, 2025

Historically, vulnerability management and threat management have been separate disciplines, but in a risk-focused world, they need to be brought together.

Continue reading

Stacked Defense from the Hardware Up

By Tiffany Bergeron

January 3, 2025

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.

Continue reading

Summiting the Pyramid: Bring the Pain with Robust and Accurate Detection

By Michaela Adams, Roman Daszczyszak, Steve Luke

December 16, 2024

Summiting the Pyramid (STP) provides a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections against adversary behavior.

Continue reading

The Best Defense is a Security Capability Mapped to ATT&CK

By Tiffany Bergeron

December 13, 2024

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.

Continue reading

Threat-Informed Defense Applies Broadly – 2024 R&D Roadmap Update – Part Three

By Suneel Sundar

November 22, 2024

The third principle for our 2024 research program is Threat-Informed Defense applies broadly. You will find Center projects that apply threat-informed defense to artificial intelligence enabled systems, to hardware, and a variety of platforms.

Continue reading

Share the How – 2024 R&D Roadmap Update – Part Two

By Suneel Sundar

November 22, 2024

Our mission is to advance the state of the art and state of the practice in threat-informed defense globally. To make that transition from art to practice for all defenders, our second principle is Share the how.

Continue reading