MITRE ATT&CKcon 5.0: Elevating Cybersecurity Knowledge

Cybersecurity remains at the forefront of the global conversation, and MITRE ATT&CKcon 5.0 is a pivotal event in the field. Scheduled for October 22-23, 2024, in McLean, Virginia, the conference serves as a cornerstone for cybersecurity professionals, researchers, and policymakers. Hosted by MITRE, ATT&CKcon is centered around the evolution of the MITRE ATT&CK framework—a globally… Continue reading MITRE ATT&CKcon 5.0: Elevating Cybersecurity Knowledge

Securing the Clouds: The Top 10 CSPM Tools Shaping Cloud Security

Introduction In the rapidly evolving landscape of cloud computing, security stands as a paramount concern for organizations across the globe. Cloud Security Posture Management (CSPM) tools have emerged as crucial instruments to help businesses safeguard their cloud environments from misconfigurations, non-compliance, and external threats. This article delves into the top 10 CSPM solutions, highlighting their… Continue reading Securing the Clouds: The Top 10 CSPM Tools Shaping Cloud Security

Cloud Web Application and API Protection Magic Quadrant

The market for protecting cloud web applications and APIs is expanding quickly. You can use this Magic Quadrant to find cloud WAAP providers that provide simple controls and specialised defences against sophisticated bots and changing API attacks.Planning assumptions for the futureCloud web application and API protection platform (WAAP) services over WAAP appliances and IaaS-native WAAP… Continue reading Cloud Web Application and API Protection Magic Quadrant

Serverless Top security best practices

Describe serverless.A cloud execution model is serverless computing. It enables users and developers to create and use applications and services without having to worry about servers. Applications are created more quickly, launched only when necessary, and infrastructure management is no longer necessary. Servers do still exist in serverless, but they are removed from the process… Continue reading Serverless Top security best practices

Campaigns to be Introduced to MITRE ATT&CK V12

Primary Articles Published by Matt Malona In ATT&CK 2022 roadmap, at ATT&CKCon 3.0, and most recently on the SANS Threat Analysis Rundown, we’ve discussed incorporating campaigns into ATT&CK, but their release is soon approaching! Beginning with the release of ATT&CK v12 on October 25, you will be able to use the Campaigns structure for all… Continue reading Campaigns to be Introduced to MITRE ATT&CK V12

The Azure Threat Research Matrix is explained

It’s typical for the assessment team to cite the MITRE ATT&CK knowledge base when conducting an offensive security assessment so that high-level stakeholders can see visually which techniques were effective and administrators and defenders can comprehend the techniques used in order to correct or defend against them in the future. But there is no official… Continue reading The Azure Threat Research Matrix is explained

Exit mobile version