SentinelOne, the autonomous endpoint protection company, announced new EDR capabilities that take its integration with the MITRE ATT&CK framework to the next level. Delivered via SentinelOne’s single agent, single codebase, single console architecture, SentinelOne is the first to allow security teams to use the MITRE ATT&CK framework as the new threat hunting standard. Through integrating the MITRE framework with its ActiveEDR and Ranger IoT capabilities, SentinelOne continues to deliver on its commitment to deliver the … More
The post SentinelOne integrates the MITRE framework with its ActiveEDR and Ranger IoT capabilities appeared first on Help Net Security.
ThreatConnect, provider of the industry’s only intelligence-driven security operations platform announces the support of the MITRE ATT&CK framework, a globally-accessible knowledge base of adversary tactics and techniques, within its own Platform. Users of the ThreatConnect Platform will now be able to classify their intelligence and derive meaningful conclusions to help prioritize responses. The ATT&CK Framework was developed by The MITRE Corporation, and the ATT&CK knowledge base is used as a foundation for the development of … More
The post ThreatConnect Platform now supports MITRE ATT&CK framework appeared first on Help Net Security.
In Part I, I described some structural problems in MITRE’s ATT&CK adversarial behavior framework. We looked at a couple of examples of techniques that vary greatly in terms of abstraction as well as techniques that ought to be classified as parent and sub-technique. Both examples are borne out of the lack of hierarchical structure among […]… Read More
The post ATT&CK Structure Part II: From Taxonomy to Ontology appeared first on The State of Security.