top of page


New Update: ATTACK-View and ATT&CK Relational Data Model for MITRE ATT&CK Version 15.0
New Update: ATTACK-View and ATT&CK Relational Data Model for MITRE ATT&CK Version 15.0
2 min read
Â


Unveiling the Power of Kernel Development in Custom Security Solutions: A Case Study on Protecting Volume Shadow Copies
Delving into kernel development for bespoke security: The key to advanced, custom protection controls
3 min read
Â


Securing Your Software Supply Chain: Lessons from the zx Vulnerability
Supply chain attacks have escalated as a major cyber threat targeting upstream components in software production processes.
2 min read
Â
bottom of page



