MITRE ATT&CK™ offers the security community a common language to communicate about adversary tactics, techniques, and behaviors. In the articles and resources below, we offer guidance on how security teams can use the framework to expand detection coverage and increase visibility.

Take an in-depth look at the most prevalent ATT&CK techniques facing your business in our latest Threat Detection Report.


    Take action with the 2021 Threat Detection Report


      Remapping Red Canary with ATT&CK sub-techniques


        Researchers, Assemble! Why Red Canary is a Founding Sponsor of MITRE’s Center for Threat-Informed Defense


          ATT&CK T1501: Understanding systemd service persistence


            Four tools to consider if you’re adopting ATT&CK


              ATT&CK™ Is Only as Good as Its Implementation: Avoiding Five Common Pitfalls


                Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests


                  Q & A: How to Use the MITRE ATT&CK™ Framework to Mature Your Threat Hunting Program

                  Integrating MITRE ATT&CK™ into Red Canary detections