About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
The Anatomy of an Att&ck
Related Media
The bad guys are trying to break into your IT system: They've got tactics, techniques, and procedures (TTPs) they deploy. What about the "good guys" in security? They need a strategy to defend and respond, which starts with better understanding the enemy, in this case, intruders/hackers. In this video, Jeff "the security guy" presents the MITRE ATT&CK framework; it defines nomenclature for classifying and describing cyberattacks and intrusions, as well as the TTPs behind them, so you can "know your enemy".
- Tags
- Appears In
Loading