Attack Flow v3
With Attack Flow, you will capture the entire attack and communicate what matters!
December 17, 2024
Summiting the Pyramid (STP) creates a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections against adversary behavior. With this update, STP reduces false positives and expands scoring to network-based analytics.
Adversaries can easily evade cyber analytics that are dependent on specific tools or artifacts.
Create and apply a methodology to evaluate the dependencies inside analytics and make them more robust by focusing on adversary behaviors.
Shift the advantage towards defenders with improved analytics that catch adversaries even as they evolve and detect future campaigns.
With Attack Flow, you will capture the entire attack and communicate what matters!
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.