Capabilities & Resources
Explore our suite of tools and resources advancing cybersecurity.
- Autonomous Cyber Operations
- Cloud Security
- Cross Domain Solutions
- Cryptography and Trust
- Cyber Adversary Emulation
- Cyber Analytics
- Cyber Assessments
- Cyber Deception and Adversary Engagement
- Cyber Forensics
- Cyber Resiliency
- Cyber Safety
- Cyber Strategy and Governance
- Cyber Supply Chain Security
- Cyber Threat Intelligence
- Defensive Cyber Operations
- Enterprise Security Architecture
- Identity, Credential, and Access Management
- IoT Systems Security
- Offensive Non-Kinetics
- Privacy
- Security Automation and Management
- Software Assurance
Our Dedicated Innovation Centers
Cyber Infrastructure Protection Innovation Center
Develops technologies, practices, and approaches to protect critical infrastructure from malicious cyber or non-kinetic attack or disruption.
Cyber Operations and Effects Innovation Center
Provides solutions and expertise performing defensive cyber operations, enabling offensive objectives, and conducting adversary emulation.
Cyber Solutions Innovation Center
Conducts high-impact research and investigations to advance innovative and effective cyber solutions.
Develops technologies, practices, and approaches to protect critical infrastructure from malicious cyber or non-kinetic attack or disruption.
Provides solutions and expertise performing defensive cyber operations, enabling offensive objectives, and conducting adversary emulation.
Conducts high-impact research and investigations to advance innovative and effective cyber solutions.
Resources
11 Strategies of a World Class Cyber Operations Center
The playbook covers best practices for managers, technical leads, engineers, and analysts to level up cyber defenses.
ATT&CK Evaluations
Evaluations follow a rigorous, transparent methodology, using a collaborative, threat-informed purple-teaming approach to evaluate solutions within the context of ATT&CK.
CALDERA
A scalable, automated adversary emulation platform that empowers cyber practitioners to save time, money, and energy through automated security assessments.
CAPEC
Common Attack Pattern Enumeration and Classification provides a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities.
CAVEAT
Cloud Adversarial, Vectors, Exploits, and Threats is a threat-informed framework addressing the unique risks of cloud environments with detailed security guidance to ensure implementation of detection and mitigation capabilities.
CREF Navigator
Cyber Resiliency Engineering Framework Navigator is a platform in which the complex relationships of NIST SP 800-160 Volume 2 can be searched and visualized, informing engineers designing resilient cyber solutions.
CVE
The Common Vulnerabilities and Exposures program identifies, defines, and catalogs publicly disclosed cybersecurity vulnerabilities.
CWE
Common Weakness Enumeration serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.
DEFEND
The MITRE-developed, National Security Agency-funded framework offers an open model with standardized vocabulary for employing techniques to counter malicious cyber activity.
ECHO
Enhanced CTI Sharing for Partner Organizations (ECHO) is an application that mines and contextualizes cyber threat intelligence.
EMB3D
A threat model that provides a cultivated knowledge base of cyber threats to embedded devices, offering a common understanding of these threats with security mechanisms to mitigate them.
Pagination
- Page 1
- Next page