About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
  Home > Our Work > Mission Areas > Cybersecurity >

Cybersecurity -- Strengthening Cyber Defense
   
Home
About
Leadership
Thinking
Forward
Contact Us
Focus Areas
Situation
Awareness
Resiliency
Threat-Based
Defense
Partnership
Innovation
Blog:
Cyber Depot
Resource
Center
Research
Standards
Tools
Awareness
& Training
Library
Learn more about MITRE's free mobile app

Cyber Depot

Catch up on the latest developments in cybersecurity from MITRE’s leading experts and find out how to apply new tools and technologies in your own work environment.

SANS held its first Cyber Threat Intelligence Summit, bringing together network defenders confronting advanced cyber adversaries. Presenters and panelists shared the latest approaches to intelligence in the face of an ever-advancing cyber adversary. I had the privilege of speaking at this event and want to share my thoughts on it. read more >>

Wesley Shields: Today we're taking a detour from our regular ChopShop posts to talk about another one of MITRE's open source projects: Yaraprocessor. Stephen DiCato will be illustrating how the yarashop module for ChopShop can be used to scan network streams with Yaraprocessor. read more >>

We've all heard the adage that in order to be effective in defense, you have to think "red:" by thinking like an adversary, you can be a better defender. In cyber defense, by knowing more about how software can be exploited, we can build more secure code to begin with. read more >>

Nate Adams
Cyber Training:
New Vulnerability Assessment

Hot off the success of ShmooCon 2013, where the Open Security Training community rallied colleagues to become instructors, we're talking with Nate Adams. read more >>

As we continue to talk about the tools useful for active cyber defense, we don't want to lose sight of the role they also play in cyber threat intelligence. read more >>

We'd like to thank the conference organizers of ShmooCon for letting us host the "Train the Trainer" sessions this year. read more >>

Many cyber threats need a weakness to exploit. Typically that weakness is a software flaw in an application that can be exploited to compromise the integrity of a host system and unleash a cyber-attack within a company. read more >>

In the previous two posts I talked about the why of ChopShop and the what of ChopShop modules. In this post I'll talk about the how of a very simple module. read more >>

Xeno Kovah
Cyber Training:
Rootkits

This is the fourth in a series of posts about internally developed computer security training classes that have been taught at MITRE (Technical Training) and have been publicly released. read more >>

ShmooCon has agreed to do something a little different this year. Unlike many conferences, ShmooCon has avoided offering paid training. This year we proposed to host a "Train the Trainer" event, and they accepted. read more >>

The annual ShmooCon hacker convention will be held February 15-17, 2013 in Washington DC. CND tool developers and cyber defenders might be interested in three MITRE presentations. read more >>

Xeno Kovah
Cyber Training:
The Life of Binaries

This is the third in a series of posts about internally developed computer security training classes that have been taught within MITRE (Technical Training) and have been publicly released. read more >>

In the first post, we introduced why Chopshop, a network protocol analyzer framework, can be a useful tool in decoding network traffic for incident response. In this second part, we'll discuss how writing additional modules can extend Chopshop. read more >>

This is the second in a series of posts about internally developed computer security training classes that have been taught within MITRE (Cyber Training) and have been publicly released.

In this post, the editor continues an interview with Xeno Kovah about his 2-day training class, Intermediate Intel x86: Assembly, Architecture, and Applications, released to the Open Training community. read more >>

Performing network defense can be a daunting task. In an incident response scenario you must be able to answer questions such as, "What happened, and what data left our network?" Assuming you have packet capture from the incident, being able to answer these questions hinges on your ability to understand the protocols in question. If it's a common protocol that Wireshark has decoding capability for, then answering those questions is as easy as using Wireshark. But what do you do when it's a protocol Wireshark doesn't know how to decode? Well, you have to do it yourself. read more >>

This is the first in a series of posts that will describe our drive to release internally developed computer security training classes that originated at MITRE.

In this post, the editor shares an interview with Xeno Kovah about his two-day training class, Introductory Intel x86: Assembly, Architecture, and Applications, released to the Open Training community. read more >>


 
Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development
 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us