Skip to content

Bringing Rigor to CTEM with Threat-Informed Defense

While vulnerability management is an essential part of good cyber hygiene, it isn’t the only defense necessary against...

Optimize Your Security Budget and Improve Security with Threat-Informed Defense

I’ve been on the road lately asking security leaders how their teams reply to the question: Can we defend our most...

Gen AI in Security – Improving SOC, CTI, and Red Team Tasks

A key piece of advice when starting a company that I found valuable is “solve a specific problem.” AI has unlocked...

Understanding ATT&CK Coverage, Looking Beyond MITRE ATT&CK Evaluations

Last week, Forrester released analysis of the recent MITRE ATT&CK Evaluations, where Allie Mellon, Principal Analyst,...

Stop Chasing Vulnerabilities, Start Asking “Then What?”

For years a vulnerability-centric approach to security has been the main focus, but this keeps teams guessing whether...