InDark Roast SecuritybyKatlyn GalloIntegrating Threat Intelligence & ATT&CK Into a Security ProgramHow can companies use threat intelligence and the ATT&CK framework to make their security programs more effective?Jul 19, 2022Jul 19, 2022
InDark Roast SecuritybyKatlyn GalloRisk Management vs. Threat Intelligence-Driven Security ProgramsCybersecurity Capstone — Part SixApr 29, 20221Apr 29, 20221
InDark Roast SecuritybyKatlyn GalloCompiling Priority CVEs for Vulnerability Remediation PrioritizationCybersecurity Capstone — Part FiveApr 21, 2022Apr 21, 2022
InDark Roast SecuritybyKatlyn GalloAnalyzing ATT&CK Matrix Gaps & Proposing MitigationsCybersecurity Capstone — Part FourApr 5, 2022Apr 5, 2022
InDark Roast SecuritybyKatlyn GalloAssessing & Mapping Security Tool Capabilities to the ATT&CK MatrixCybersecurity Capstone — Part ThreeMar 31, 2022Mar 31, 2022
InDark Roast SecuritybyKatlyn GalloPrioritizing Malware & ATT&CK Techniques Using Recorded FutureCybersecurity Capstone — Part TwoMar 7, 2022Mar 7, 2022
InDark Roast SecuritybyKatlyn GalloPrioritizing Threat Actors Using Recorded FutureCybersecurity Capstone — Part OneFeb 15, 2022Feb 15, 2022
InDark Roast SecuritybyKatlyn GalloAdversary Threat Profiling & Risk Prioritization Using Recorded Future & MITRE ATT&CKCybersecurity Capstone — Project ProposalFeb 1, 2022Feb 1, 2022