Loading...
Browse 243 mitre attack tools
On-demand cybersecurity readiness exercises and tabletops for incident response
On-demand cybersecurity readiness exercises and tabletops for incident response
Skills development platform for secure software development training
Skills development platform for secure software development training
SaaS platform for threat-informed defense using adversary tradecraft analysis
SaaS platform for threat-informed defense using adversary tradecraft analysis
Threat intel platform providing daily defensive recommendations & coverage maps
Threat intel platform providing daily defensive recommendations & coverage maps
Automates security tool stack optimization based on threat profiles
Automates security tool stack optimization based on threat profiles
Next-gen VSOC platform for automotive cybersecurity monitoring & response
Next-gen VSOC platform for automotive cybersecurity monitoring & response
AD security platform mapping attack paths and misconfigurations in AD environments
AD security platform mapping attack paths and misconfigurations in AD environments
Compliance and identity risk platform mapping controls to frameworks
Compliance and identity risk platform mapping controls to frameworks
AI-driven threat intelligence platform with automated hunting and enrichment
AI-driven threat intelligence platform with automated hunting and enrichment
AI-led threat hunting platform for proactive threat detection and investigation
AI-led threat hunting platform for proactive threat detection and investigation
Managed cyber resilience service for business continuity and recovery.
Managed cyber resilience service for business continuity and recovery.
AI-driven threat detection & hunting platform with MITRE ATT&CK analytics
AI-driven threat detection & hunting platform with MITRE ATT&CK analytics
AI-powered threat detection across IaaS, SaaS, code, and identity systems
AI-powered threat detection across IaaS, SaaS, code, and identity systems
Offensive cybersecurity services simulating real-world attacks
Offensive cybersecurity services simulating real-world attacks
Professional certification course covering threat modeling frameworks and methods
Professional certification course covering threat modeling frameworks and methods
AI/LLM security certification covering OWASP Top 10, model attacks & defenses
AI/LLM security certification covering OWASP Top 10, model attacks & defenses
Security data operations platform for log routing, detection, and analytics
Security data operations platform for log routing, detection, and analytics
SIEM platform with compliance monitoring and reporting for regulatory frameworks
SIEM platform with compliance monitoring and reporting for regulatory frameworks
Runtime guardrails for GenAI apps providing real-time threat detection & response
Runtime guardrails for GenAI apps providing real-time threat detection & response
Email security platform protecting against phishing, malware, and BEC attacks
Email security platform protecting against phishing, malware, and BEC attacks
Enterprise threat intelligence platform for proactive threat detection
Enterprise threat intelligence platform for proactive threat detection
Deception platform that diverts attackers & provides threat intelligence
Deception platform that diverts attackers & provides threat intelligence
MDR service with 24/7 SOC, EDR, threat hunting, and incident response
MDR service with 24/7 SOC, EDR, threat hunting, and incident response
Malware sandboxing platform for threat analysis and detection in SOCs
Malware sandboxing platform for threat analysis and detection in SOCs
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance