Skip Navigation
Get a Demo


Prioritizing Data Sources for Minimum Viable Detection

From the stage at ATT&CKcon 2.0, our CSO Keith McCammon talked about how you can make thoughtful decisions about the data you’re collecting, the questions you’re asking of that data, and the processes, context, and expertise necessary to properly answer those questions. 


Want to see more? Check out our complete conference recap here.


    Four tools to consider if you’re adopting ATT&CK


      Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32


        Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell


          ATT&CK™ Is Only as Good as Its Implementation: Avoiding Five Common Pitfalls


            Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests


              Q & A: How to Use the MITRE ATT&CK™ Framework to Mature Your Threat Hunting Program


                Red Canary ATT&CKs (Part 2): Designing ATT&CK® Interfaces in Red Canary


                  Red Canary ATT&CKs (Part 1): Why We’re Using ATT&CK Across Red Canary

                  Back to Top