Category

Cyber Threat Intelligence

Secure AI

A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new threat information, and provides mitigation strategies.

Continue reading

Know Your Adversary's Next Move With TIE

Describing adversarial behaviors in the form of tactics, techniques, and procedures (TTPs) using MITRE ATT&CK® revolutionized detection and response. Focusing on TTPs creates an opportunity for high-fidelity detection of adversaries. If we can detect a behavior, the adversary will need to change …

Continue reading

Technique Inference Engine

Know your adversary’s next move with the Technique Inference Engine, a machine learning-powered tool that infers unseen adversary techniques, providing security teams actionable intelligence.

Continue reading

Threat Modeling With ATT&CK

Threat Modeling with ATT&CK defines how to integrate MITRE ATT&CK® into your organization’s existing threat modeling methodology. This process is intended for universal application to any system or technology stack (large or small) using existing threat modeling methodologies like STRIDE, …

Continue reading

Turn Your Threat Model to Supermodel with ATT&CK

Cybersecurity teams use threat modeling as a critical component of defensive cyber operations to understand and reduce threats to their systems and environments. To stay up to date on various threats, teams rely on cyber threat intelligence (CTI) reporting.

Continue reading

Sightings Ecosystem

This project provides cybersecurity defenders and researchers with critical insight into real-world adversary behaviors mapped to ATT&CK. The ecosystem fundamentally advances the collective ability to see threat activity across organizational, platform, vendor, and geographical boundaries. …

Continue reading

Insider Threat TTP Knowledge Base

The Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base advances our collective understanding of the technical mechanisms that insider threats use. With this knowledge, Insider Threat Programs and Security Operations Centers can detect, mitigate, and emulate insider actions on IT …

Continue reading

Leadership Spotlight: CTI Blueprints with Keith Wilson (ATTACKIQ)

Learn more about CTI Blueprints, one of the Center’s new projects, from Keith Wilson of Attack IQ. Visit the Center’s CTI Blueprints project summary page for links to the Github downloads, online builder and more: CTI Blueprints.

Continue reading

CTI Blueprints: Adversary Village

As a part of Adversary Village’s Adversary Guru series, MITRE’s Center for Threat Informed Defense presents CTI Blueprints, a free suite of templates, sample reports, and a software tool designed to help analysts create high-quality actionable reports more consistently and efficiently.

Continue reading

Leadership Spotlight: MITRE ATT&CK Workbench with Douglas Santos

In Episode 9 of the Center for Threat-Informed Defense’s “Leadership Spotlight” video series, Douglas José Pereira dos Santos, Director, Advanced Threat Intelligence, at Fortinet’s FortiGuard Labs, discusses Fortinet’s role in collaborating on ATT&CK Workbench. Douglas highlights issues …

Continue reading