Using the MITRE ATT&CK Knowledge Base to Improve Threat Hunting and Incident Response

Using the MITRE ATT&CK Knowledge Base to Improve Threat Hunting and Incident Response

Threat hunting and incident response are critical roles of security operations center (SOC) analysts. With the ever-rising sophistication of new and emerging attacks, analysts need an edge to stay ahead of adversaries.

This paper describes the MITRE ATT&CK framework including:

  • What the model offers to SOC analysts;
  • Why you should consider using the knowledge base.

Security leaders and practitioners will find this paper useful for planning security solutions to stay ahead of adversaries.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.