Category

Blog

Guarding the Grid: Defending Operational Technology With ATT&CK

Critical infrastructure such as electrical generation facilities, water treatment plants, and transportation systems are a lifeline for our communities. Unfortunately, this dependence has made critical infrastructure a prime target for threat actors.

Continue reading

Industry Leaders Expand Threat Informed Defense to AI Enabled Systems

As artificial intelligence (AI) becomes increasingly integrated into various industries, the importance of securing AI-enabled systems cannot be overstated. Recognizing this critical need, the Center for Threat-Informed Defense is launching a major initiative to bolster security for AI-enabled …

Continue reading

Turn Your Threat Model to Supermodel with ATT&CK

Cybersecurity teams use threat modeling as a critical component of defensive cyber operations to understand and reduce threats to their systems and environments. To stay up to date on various threats, teams rely on cyber threat intelligence (CTI) reporting.

Continue reading

Software Security: Now Threat-Informed!

The CWE with Environmental CVSS Calculator brings threat-informed defense into the software development lifecycle. The result is better prioritization of weaknesses while software is being created and ultimately guides software engineering teams to develop software with fewer vulnerabilities.

Continue reading

Infiltrating Defenses: Abusing VMware in MITRE's Cyber Intrusion

This is the third and final blog post in a series detailing MITRE’s encounter with a state-sponsored cyber threat actor in our research and experimentation network, NERVE. It builds upon the insights shared in our April 19, 2024 post, “Advanced Cyber Threats Impact Even the Most Prepared” and May 3, …

Continue reading

More Threat Informed in More Ways With More Defenders

The Center for Threat-Informed Defense released five new projects in the first quarter of 2024, and this momentum will carry through the calendar year. You can use our latest research to advance your understanding of insider threats, make data driven decisions about your defenses, search and explore …

Continue reading