MITRE Shield Blog Terms - Attivo Networks

MITRE Shield

Leveraging MITRE Shield to Defend Against Ransomware

Written by: Joseph R. Salazar, CISSP, CEH, EnCE – Ransomware attacks have evolved and grown in number.  Traditional ransomware sought to spread and encrypt as many endpoints as possible, but Ransomware 2.0 attacks employ advanced methods or have a human controller directing their activities. These attacks spend much more time conducting discovery to identify business-critical assets for encryption. Because these assets are essential for business continuity and daily operations, the organization is more likely to pay to recover them instead of spending the money on endpoint systems they could re-image and recover.  Attackers encrypting the entire Active Directory server infrastructure can demand much higher ransoms, and the organization must pay or else lose money, time, and resource attempting to restore operations. Additionally, these attackers often exfiltrate data and threaten to release it to induce ransom payment, often demanding a second ransom to prevent the release of the information.

Stopping the Next SolarWinds Requires Doing Something Different

By Tony Cole, CTO, Attivo Networks Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale? The SolarWinds breach is not the first major supply chain breach, but previous similar breaches failed to prompt effective regulatory action. Both governments and businesses remain focused on things like cyber …

Stopping the Next SolarWinds Requires Doing Something Different Read More »

Data Connectors and Attivo Networks Web Briefing: Stopping Privilege Escalation without Breaking the Bank

Join this CISO Panel that will cover why attackers have been successful gaining privileged access and discuss practical approaches that help organizations modernize their security defenses.   Recent headlines underscore the problem of privilege escalation. However, CISOs are torn between strategy and firefighting. It often seems that protecting corporate assets, confidential data, and uninterrupted service …

Data Connectors and Attivo Networks Web Briefing: Stopping Privilege Escalation without Breaking the Bank Read More »

Strengthening Zero-Trust Architecture

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries. The invention of the term “zero trust” is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although it’s not new, the concept has received renewed interest …

Strengthening Zero-Trust Architecture Read More »

betanews

How the MITRE Shield can help organizations better address their adversaries [Q&A]

The MITRE ATT&CK framework is now used by many organizations to help them understand and counter threats. Less well known is the latest addition, MITRE Shield. [Beta News] spoke to Carolyn Crandall, chief deception officer and CMO at Attivo Networks to find out more about how this can be used along with MITRE ATT&CK to …

How the MITRE Shield can help organizations better address their adversaries [Q&A] Read More »

It wire logo

How MITRE Shield helps organisations develop a better deception and concealment strategy

In today’s hyper-connected business world, maintaining effective IT security is a complex task. New cyber threats are constantly emerging, and the risk of disruption and loss has never been higher. With this challenge in mind, the US-based MITRE Corporation recently unveiled a new knowledge base designed to help organisations better understand security risks and the …

How MITRE Shield helps organisations develop a better deception and concealment strategy Read More »

DarkReadingLogo

MITRE Shield Matrix Highlights Deception & Concealment Technology

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today’s security landscape. … It’s an age-old question: How do you know if you need more security? MITRE has been diligently working to document tactics and techniques to assess security readiness and answer …

MITRE Shield Matrix Highlights Deception & Concealment Technology Read More »

tag cyber logo

Mapping Your Active Defense Capabilities to MITRE Shield

MITRE Shield is a knowledge base of capabilities surrounding Active Defense and adversary engagements, and it complements MITRE ATT&CK. Where ATT&CK provides a data model for protecting the enterprise against cybersecurity threats, MITRE Shield focuses on capabilities that help change an attack engagement from defensive to offensive. Join Edward Amoroso, CEO of TAG Cyber and …

Mapping Your Active Defense Capabilities to MITRE Shield Read More »

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield Read More »

Attivo Networks Covers 27 out of the 33 Defense Techniques Identified in MITRE Shield

Company Delivers the Most Comprehensive Active Defense with Detection Coverage for 123 of the 190 MITRE Shield Use Cases Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced that its solutions provide organizations with a vast majority – 82 percent – of the active defense measures presented in …

Attivo Networks Covers 27 out of the 33 Defense Techniques Identified in MITRE Shield Read More »

Scroll to Top