This is a wonderful illustration of the process that many of us should consider working through – how does a particular threat framework map to our existing security framework. In this situation, the author is attempting to map the ATT&CK framework to the CIS Critical Controls, but this exercise could just as easily have involved NIST or FFIEC or another framework. Consider the value of exploring and recognizing your strengths and weaknesses in a more real-time sense.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page