MITRE Engenuity
  • Home
  • About Us
    • Our Team
  • Impact Areas
    • Cyber
      • Center for Threat-Informed Defense
      • ATT&CK® Evaluations
      • MITRE ATT&CK Defender
    • 5G
      • Open Generation Consortium
      • SecureG
    • Semiconductors
    • Health
    • Transportation
  • Insights
  • Contact Us
Select Page
ATT&CK Evaluation APT29 Emulation Plan Added to the Emulation Plan Library

ATT&CK Evaluation APT29 Emulation Plan Added to the Emulation Plan Library

by MITRE Engenuity | Jan 21, 2021 | ATT&CK Evaluations, Center for Threat-Informed Defense, Cybersecurity

In April 2020, we released the results and methodology from our APT29 ATT&CK Evaluation. Today, we are pleased to announce the re-release of this plan in the recently released Center for Threat-Informed Defense emulation plan format to improve the usability of our...
Center for Threat-Informed Defense releases security control mappings to ATT&CK

Center for Threat-Informed Defense releases security control mappings to ATT&CK

by MITRE Engenuity | Dec 15, 2020 | ATT&CK Evaluations, Center for Threat-Informed Defense, Cybersecurity

The Center for Threat-Informed Defense (Center) just released set of mappings between MITRE ATT&CK® and NIST Special Publication 800-53 with supporting documentation and resources. These publicly-available mappings provide a critically important resource for...
ATT&CK Evaluations for Enterprise: Carbanak+FIN7 Welcomes 30 Participants with a Site Update

ATT&CK Evaluations for Enterprise: Carbanak+FIN7 Welcomes 30 Participants with a Site Update

by MITRE Engenuity | Sep 17, 2020 | ATT&CK Evaluations, Cybersecurity

Earlier this year we provided additional details on our ATT&CK Evaluations for Enterprise Carbanak and FIN7 evaluation, and also announced that the ATT&CK Evaluations program was moving to MITRE Engenuity, MITRE’s tech foundation for public good. Today...
Announcing the ATT&CK Evaluations for ICS Fall 2020 Cohort

Announcing the ATT&CK Evaluations for ICS Fall 2020 Cohort

by MITRE Engenuity | Aug 10, 2020 | ATT&CK Evaluations, Cybersecurity

In May, MITRE Engenuity announced an expansion of its ATT&CK Evaluations program to include an evaluation centered around anomaly and threat detection capabilities for industrial control systems (ICS). Today, we’re very excited to announce that our initial...
MITRE Engenuity Announces ATT&CK Evaluations for ICS Vendors

MITRE Engenuity Announces ATT&CK Evaluations for ICS Vendors

by MITRE Engenuity | May 5, 2020 | ATT&CK Evaluations, Cybersecurity, Press Release

MITRE Engenuity Announces ATT&CK Evaluations for ICS Vendors Evaluations to Focus on Malware Capable of Physical Damage McLean, VA, and Bedford, MA, May 5, 2020 – MITRE’s foundation for public good, MITRE Engenuity, will conduct an ATT&CKâ„¢...
APT29 ATT&CK Evaluations Results Released

APT29 ATT&CK Evaluations Results Released

by MITRE Engenuity | Apr 22, 2020 | ATT&CK Evaluations, Cybersecurity

APT29 ATT&CK Evaluations Results Released Since MITRE introduced ATT&CK in May 2015, the practitioner community has come to rely on it to enable better communications and management around cybersecurity. ATT&CK Evaluations leverages this knowledge base to...
« Older Entries
Next Entries »
  • twitter
  • linkedin
  • youtube
  • Terms & Conditions
  • Privacy Policy
Manage Cookie Consent
We use cookies to improve your experience on our Site and to show you adapted marketing information. To find out more, please read our Privacy Policy.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}