Skip to content

Knowing Your Defenses Beyond a Vulnerability Focused Approach to CTEM

The chaotic world of cybersecurity where the threats from nation-states, cyber gangs, botnet operators, and APT groups...

Bringing Rigor to CTEM with Threat-Informed Defense

While vulnerability management is an essential part of good cyber hygiene, it isn’t the only defense necessary against...

Optimize Your Security Budget and Improve Security with Threat-Informed Defense

I’ve been on the road lately asking security leaders how their teams reply to the question: Can we defend our most...

Gen AI in Security – Improving SOC, CTI, and Red Team Tasks

A key piece of advice when starting a company that I found valuable is “solve a specific problem.” AI has unlocked...

Understanding ATT&CK Coverage, Looking Beyond MITRE ATT&CK Evaluations

Last week, Forrester released analysis of the recent MITRE ATT&CK Evaluations, where Allie Mellon, Principal Analyst,...