TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

A CISO’s Reflections on RSA 2017

2017-02-28 · Read original ↗

ATT&CK techniques detected

3 predictions
T1595Active Scanning
38%
“, still others are actually meant to find rogue network devices. none of the solutions i saw tied all of these together in an effective way. lastly, there was little explanation about the richness of these vendors ’ apis. the ability to integrate and provide clarity and automatio…”
T1598Phishing for Information
33%
“they uncover a new threat at one customer, they can hunt everywhere rapidly to see who else might be impacted. there also seems to be confusion between threat intelligence and threat hunting, which is resulting in a conflation of these two related but distinct functions. talent s…”
T1592Gather Victim Host Information
31%
“, still others are actually meant to find rogue network devices. none of the solutions i saw tied all of these together in an effective way. lastly, there was little explanation about the richness of these vendors ’ apis. the ability to integrate and provide clarity and automatio…”

Summary

Recapping RSA 2017: Endpoint Protection, Threat Hunting, and Talent Searching Abound!