Secure AI
A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new …
February 17, 2026
With Ambiguous Techniques, you will reduce false positives, focus on the highest‑value log sources, and uncover adversarial use of living‑off‑the‑land activity with an evidence‑driven detection design process.
Many ATT&CK techniques, especially those used in living-off-the-land activity, produce observables that are indistinguishable from benign behavior, making it difficult for defenders to determine malicious intent.
Apply contextual analysis, minimum telemetry requirements, and confidence‑based scoring of log sources to prioritize the data that most effectively separates malicious from benign use of ambiguous techniques.
Reduce false positives and improve detection accuracy so defenders can focus on the alerts that truly matter while using an evidence‑based approach to select and justify telemetry investments.
A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new …
The Fight Fraud Framework strengthens fraud analysis by giving teams a clear behavioral structure to identify risks, focus investigations, and …
With Ambiguous Techniques, you will reduce false positives, focus on the highest‑value log sources, and uncover adversarial use of …
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.