From the Winter 2021 Issue

Threat Intelligence-Led Cybersecurity

Author(s):

Brian Contos, VP & CISO, Mandiant Security Validation , Mandiant

Threat Intelligence

Successfully predicting, preventing, detecting, responding, and recovering from cyber-attacks requires you to have in-depth knowledge of the attacker, their tactics, and their techniques. While most organizations operate with some level of threat intel, some still haven’t embraced automation as a way to operationalize intel for the validation of TTPs and IOCs against their security tools, … Read more

From the Fall 2018 Issue

The Industrialization of Cybersecurity Red and Blue Teaming

Author(s):

Brian Contos, VP & CISO, Mandiant Security Validation , Mandiant

brian-contos-article-header

The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in cybersecurity, leading to the industrialization of red and blue teaming. In large part, this industrialization has been realized through security instrumentation platforms (SIP). Security Instrumentation Platforms SIPs validate that a security system is working as needed: providing foundational … Read more