Blog-25-Mitre-Att&ck-Framework-BLOG

CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status

Nozomi Networks is a CVE Numbering Authority (CNA). The CVE Program is the international standard for identifying and naming cybersecurity vulnerabilities. The post CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status appeared ...
Blog-25-Mitre-Att&ck-Framework-BLOG

CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status

Nozomi Networks is a CVE Numbering Authority (CNA). The CVE Program is the international standard for identifying and naming cybersecurity vulnerabilities. The post CISA-Sponsored CVE Program Grants Nozomi Networks CNA Status appeared ...

MITRE Releases an Update to The Common Weakness Enumeration (CWE)

MITRE has been doing exceptional work in advancing cybersecurity as a public good, and it is an excellent resource for security professionals. Possibly best known for their ATT&CK Framework, a rich source ...
The Tripwire Cybersecurity Podcast

Podcast Episode 3: How the MITRE ATT&CK Framework Can Improve Your Defenses

Listen and subscribe to our new podcast! Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim ...
What is the MITRE ATT&CK™ Framework?

The MITRE ATT&CK Framework: Impact

Not all attackers are trying to exfiltrate data. In security, we’re all familiar with CIA triad—confidentiality, availability, and integrity. While Exfiltration describes adversarial behavior with the goal of violating confidentiality, attackers may ...

Only Focused on Patching? You’re Not Doing Vulnerability Management

By Anthony Perridge, VP International, ThreatQuotientWhen I speak to security professionals about vulnerability management, I find that there is still a lot of confusion in the market. Most people immediately think I’m ...
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google Search

Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google

In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo ...
SQL Injection loses #1 spot as most dangerous attack technique

SQL Injection loses #1 spot as most dangerous attack technique

The Common Weakness Enumeration (CWE), a community-developed compilation of the most critical errors leading to vulnerabilities in software, has lowered SQL Injection from its #1 spot as the most dangerous attack technique ...

ATT&CK Structure Part II: From Taxonomy to Ontology

In Part I, I described some structural problems in MITRE’s ATT&CK adversarial behavior framework. We looked at a couple of examples of techniques that vary greatly in terms of abstraction as well ...