Published Projects

Attack Flow v3

Project Summary

With Attack Flow, you will capture the entire attack and communicate what matters!

Problem

Tracking adversary behaviors one action at a time makes it hard to build effective defenses against multi-phased attacks.

Solution

Create a language, and associated tooling, to describe flows of ATT&CK techniques and combine those flows into patterns of behavior.

Impact

Visualize and communicate how adversaries operate to define defensive actions.


Funding Research Participants



Non-Profit Participants


Explore More of Our Work:

Attack Flow v3

With Attack Flow, you will capture the entire attack and communicate what matters!

Continue reading

Threat-Informed Defense for the Financial Sector

Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …

Continue reading

Ambiguous Techniques

Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …

Continue reading

Stay Informed

Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.