MITRE Engenuity
  • Home
  • About Us
    • Our Team
  • Impact Areas
    • Cyber
      • Center for Threat-Informed Defense
      • ATT&CK® Evaluations
      • MITRE ATT&CK Defender
    • 5G
      • Open Generation Consortium
      • SecureG
    • Semiconductors
    • Health
    • Transportation
  • Insights
  • Contact Us
Select Page

MITRE Engenuity Center for Threat-Informed Defense Unveils New Affiliate Program

by MITRE Engenuity | Feb 15, 2022 | Center for Threat-Informed Defense, Press Release

The affiliate program showcases industry adoption of the center’s R&D resources to increase community awareness and advance threat-informed defense. McLean, Va. & Bedford, Mass., February 15, 2022 — MITRE Engenuity, MITRE’s tech foundation for public good,...
Center for Threat-Informed Defense Releases Impact Report, Illustrating its Collaborative R&D Approach in Cybersecurity

Center for Threat-Informed Defense Releases Impact Report, Illustrating its Collaborative R&D Approach in Cybersecurity

by MITRE Engenuity | Jan 25, 2022 | Center for Threat-Informed Defense, Cybersecurity, Press Release

The report highlights 13 R&D projects readily available to the cybersecurity community and recognizes center participants’ impact in advancing a threat-informed defense approach to security McLean, Va., [January 25, 2022] — The Center for Threat-Informed Defense...
Evaluating Mobile Security Products: Compromised Devices

Evaluating Mobile Security Products: Compromised Devices

by Billy Dyer | Mar 18, 2021 | ATT&CK Evaluations, Center for Threat-Informed Defense, Cybersecurity

As described in our overview post on evaluating mobile security technologies, we are releasing a blog series to bring the community up to a collective understanding of the mobile threat landscape, explain our current thinking on evaluating mobile security products,...
Evaluating Mobile Security Products: Malicious Applications

Evaluating Mobile Security Products: Malicious Applications

by MITRE Engenuity | Feb 24, 2021 | ATT&CK Evaluations, Center for Threat-Informed Defense, Cybersecurity, Press Release

Overview As our last post on evaluating mobile technologies mentioned, we are releasing a blog series to bring the community up to a collective understanding of the mobile threat landscape, explain our current thinking on evaluating mobile security products, and...
ATT&CK Evaluation APT29 Emulation Plan Added to the Emulation Plan Library

ATT&CK Evaluation APT29 Emulation Plan Added to the Emulation Plan Library

by MITRE Engenuity | Jan 21, 2021 | ATT&CK Evaluations, Center for Threat-Informed Defense, Cybersecurity

In April 2020, we released the results and methodology from our APT29 ATT&CK Evaluation. Today, we are pleased to announce the re-release of this plan in the recently released Center for Threat-Informed Defense emulation plan format to improve the usability of our...
Center for Threat-Informed Defense Adds menuPass Adversary Emulation Plan to Growing Library

Center for Threat-Informed Defense Adds menuPass Adversary Emulation Plan to Growing Library

by MITRE Engenuity | Feb 4, 2021 | Center for Threat-Informed Defense, Cybersecurity, Press Release

Plan tackles threat group targeting managed service providers and Japanese institutions   McLean, VA, and Bedford, MA, February 4, 2021 — MITRE Engenuity’s Center for Threat-Informed Defense (Center) has added a plan to its public...
« Older Entries
  • twitter
  • linkedin
  • youtube
  • Terms & Conditions
  • Privacy Policy
Manage Cookie Consent
We use cookies to improve your experience on our Site and to show you adapted marketing information. To find out more, please read our Privacy Policy.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}