Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 

CONFERENCE HIGHLIGHTS • VIDEO

Prioritizing Data Sources for Minimum Viable Detection

From the stage at ATT&CKcon 2.0, our CSO Keith McCammon talked about how you can make thoughtful decisions about the data you’re collecting, the questions you’re asking of that data, and the processes, context, and expertise necessary to properly answer those questions. 

 

Want to see more? Check out our complete conference recap here.

 

    Four tools to consider if you’re adopting ATT&CK

     

      Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32

       

        Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell

         

          ATT&CK™ Is Only as Good as Its Implementation: Avoiding Five Common Pitfalls

           

            Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests

             

              Q & A: How to Use the MITRE ATT&CK™ Framework to Mature Your Threat Hunting Program

               

                Red Canary ATT&CKs (Part 2): Designing ATT&CK® Interfaces in Red Canary

                 

                  Red Canary ATT&CKs (Part 1): Why We’re Using ATT&CK Across Red Canary

                   
                   
                  Back to Top