Purpling the waters – Using MITRE ATT&CK® for Red, Blue, and the Intelligence conversations in-between
Adversary Emulation, Threat Hunting, Cyber Threat Intelligence. So many of us are interested in these disciplines, but where do we start? What does this look like in an organization? Using the MITRE ATT&CK® knowledge base, we walkthrough how to get started and grow as an intelligence analyst, adversary emulation engineer, and a threat hunter in an organization. For each discipline we explore where to start, what different maturity levels look like, and open-source resources that help raise the tide.