Popular Resources

MITRE ATT&CK

MITRE ATT&CK offers the security community a common language to communicate about adversary tactics, techniques, and behaviors. In the articles and resources below, we offer guidance on how security teams can use the framework to expand detection coverage and increase visibility.

Join us for a panel discussion on the 2019 Threat Detection Report.

April 23, 2019 | 11:00am MDT

Bring your questions and comments to this interactive discussion with the researchers behind the analysis. We’ll walk through high-level findings and discuss how security teams can use the data to improve their visibility and detection.

This session will cover:

  • High-level analysis of the top ATT&CK techniques observed by Red Canary
  • Common questions on visibility and detection strategies
  • Practical tips on how to get started
  • Key trends and takeaways across industries
 

ATT&CK™ Is Only as Good as Its Implementation: Avoiding Five Common Pitfalls

 

Q & A: How to Use the MITRE ATT&CK™ Framework to Mature Your Threat Hunting Program

 

Red Canary ATT&CKs (Part 3): Mapping Our Detectors to ATT&CK Techniques

 

Red Canary ATT&CKs (Part 1): Why We’re Using ATT&CK Across Red Canary