MITRE Shield

Leveraging MITRE Shield to Defend Against Ransomware

Written by: Joseph R. Salazar, CISSP, CEH, EnCE – Ransomware attacks have evolved and grown in number.  Traditional ransomware sought to spread and encrypt as many endpoints as possible, but Ransomware 2.0 attacks employ advanced methods or have a human controller directing their activities. These attacks spend much more time conducting discovery to identify business-critical assets for encryption. Because these assets are essential for business continuity and daily operations, the organization is more likely to pay to recover them instead of spending the money on endpoint systems they could re-image and recover.  Attackers encrypting the entire Active Directory server infrastructure can demand much higher ransoms, and the organization must pay or else lose money, time, and resource attempting to restore operations. Additionally, these attackers often exfiltrate data and threaten to release it to induce ransom payment, often demanding a second ransom to prevent the release of the information.

Stopping the Next SolarWinds Requires Doing Something Different

By Tony Cole, CTO, Attivo Networks Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale? The SolarWinds breach is not the first major supply chain breach, but previous similar breaches failed to prompt effective regulatory action. Both governments and businesses remain focused on things like cyber …

Stopping the Next SolarWinds Requires Doing Something Different Read More »

Dark Reading

Strengthening Zero-Trust Architecture

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries. The invention of the term “zero trust” is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although it’s not new, the concept has received renewed interest …

Strengthening Zero-Trust Architecture Read More »

MITRE Shield and Active Defense

En el pasado mes de septiembre la organización sin fines de lucro MITRE y quien es familiar en el medio de la seguridad informática por el reconocido “ATT&CK” (tácticas, técnicas y conocimiento común de adversarios), la cual es una herramienta muy apreciada en la comunidad de inteligencia de ciberamenazas para modelar las mismas incluyendo las …

MITRE Shield and Active Defense Read More »

betanews

How the MITRE Shield can help organizations better address their adversaries [Q&A]

The MITRE ATT&CK framework is now used by many organizations to help them understand and counter threats. Less well known is the latest addition, MITRE Shield. [Beta News] spoke to Carolyn Crandall, chief deception officer and CMO at Attivo Networks to find out more about how this can be used along with MITRE ATT&CK to …

How the MITRE Shield can help organizations better address their adversaries [Q&A] Read More »

It wire logo

How MITRE Shield helps organisations develop a better deception and concealment strategy

In today’s hyper-connected business world, maintaining effective IT security is a complex task. New cyber threats are constantly emerging, and the risk of disruption and loss has never been higher. With this challenge in mind, the US-based MITRE Corporation recently unveiled a new knowledge base designed to help organisations better understand security risks and the …

How MITRE Shield helps organisations develop a better deception and concealment strategy Read More »

DarkReadingLogo

MITRE Shield Matrix Highlights Deception & Concealment Technology

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today’s security landscape. … It’s an age-old question: How do you know if you need more security? MITRE has been diligently working to document tactics and techniques to assess security readiness and answer …

MITRE Shield Matrix Highlights Deception & Concealment Technology Read More »

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield Read More »

Attivo Networks Covers 27 out of the 33 Defense Techniques Identified in MITRE Shield

Company Delivers the Most Comprehensive Active Defense with Detection Coverage for 123 of the 190 MITRE Shield Use Cases Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced that its solutions provide organizations with a vast majority – 82 percent – of the active defense measures presented in …

Attivo Networks Covers 27 out of the 33 Defense Techniques Identified in MITRE Shield Read More »

Attivo Solutions Fit MITRE Shield Like a Glove!

By: Carolyn Crandall, Cheif Deception Officer and CMO -MITRE recently announced Shield, which is a publicly available, free knowledge base of common techniques and tactics that can help experts take proactive steps to defend their networks and assets. This guide takes a similar approach to what MITRE ATT&CK® does for offense, though in this case, it presents the information around active defense concepts. Leveraging them together enables organizations to create an active defense to better address adversaries.

Scroll to Top