-
2023 ATT&CK Roadmap
A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0. It’s 2023 and we’re all a little older, including ATT&CK, which will be celebrating its 8th (!) release anniversary in a few short months. Last year we matured, expanded, deconflicted, and renovated the knowledge base, persevering through challenges to meet…
-
Introducing ATT&CK Campaigns
Introducing Campaigns to MITRE ATT&CK By: Amy Robertson, Jared Ondricek, and Matt Malone We’ve talked about building Campaigns into ATT&CK in our ATT&CK 2022 roadmap, at ATT&CKCon 3.0, and most recently on the SANS Threat Analysis Rundown but their release is now nigh! Our initial collection of Campaigns will be available starting with our ATT&CK v12 release…
-
ATT&CK Goes to v11
ATT&CK Goes to v11: Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band These go to eleven By Adam Pennington and Jason Ajmo Right on cue, ATT&CK’s latest release is out, and this time we’ve gone to v11! If you’ve been following along with our roadmap there shouldn’t be any huge surprises in store, but we…
-
Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War
Guest Post by ATT&CKcon 3.0 Keynote Speaker, Selena Larson Allan Pinkerton (Alexander Gardner — Library of Congress) At the onset of the Civil War, a man whose name would eventually become synonymous with famous American detectives was reportedly providing false reports to the Union’s top general. Allan Pinkerton, who once successfully smuggled Abraham Lincoln into Washington, D.C. to…
-
Automatically acquire and renew certificates using mod_md and Automated Certificate Management Environment (ACME) in Identity Management (IdM)
IntroductionIn a previous article, I demonstrated how to configure the Automatic Certificate Management Environment (ACME) feature included in the Identity Management (IdM) Dogtag Certificate Authority (CA). Specifically, I covered installation of IdM with random serial numbers, and how to enable the ACME service and expired certificate pruning. This article explains the management of ACME (currently…
-
Embedding agile culture as an engagement lead in Japan
In 2018, Red Hat launched our Open Innovation Labs in Japan. Through this program, our consulting team works directly with clients’ development teams, offering hands-on guidance in modern methodologies such as agile development and DevOps.We recently interviewed Yoshikazu Y., agile engagement lead and the head of Open Innovation Labs in Japan. Yoshikazu shared insights on…
-
Build RHEL 10 Beta with Insights Image Builder
Insights image builder has added Red Hat Enterprise Linux (RHEL) 10 Public Beta to the list of operating systems that you can build for all of your hybrid-cloud environments. You can learn more about RHEL 10 in the announcement here. This makes it easier than ever to customize and launch a new RHEL 10 Beta…
-
5 ways to maximize your cloud value with Red Hat solutions on AWS Marketplace
Using solutions from the world’s leading open source and hybrid cloud provider on the world’s most popular cloud provider is simpler than you think.A new strategic collaboration agreement with AWS will significantly expand availability of Red Hat offerings in AWS Marketplace, accelerating cloud modernization through virtualization and AI.IT leaders face the dual challenge of pushing…
-
Now available: Red Hat Enterprise Linux 10 Beta
Today, we’re excited to invite you to beta-test Red Hat Enterprise Linux (RHEL) 10, the next major version of the enterprise operating system. With this newest release, we’re delivering a modern Linux experience on a platform that can support enduring operational technologies and emerging workloads alike.This beta strengthens a commitment we made when we released…
-
Jumpstart GitOps with image mode
A year ago, I was introduced to image mode for Red Hat Enterprise Linux (RHEL). That introduction brought me back together with some folks I’d worked with in Project Atomic, and it proved that you could orchestrate the complete build and automation of an operating system using application pipelines. Finally, sysadmins can take advantage of…