MITRE D3FEND: Cyber Defense Technique Catalog

The D3FEND Matrix

MITRE D3FEND Matrix

D3FEND Tactics

D3FEND Base Techniques

Additional Information

--

--

--

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

EveryonesCrypto (EOC) LATOKEN Airdrop

Services that Distributed Computing Can Provide — Disney+ Free Trial!

How Do I Find my local IP Address using Powershell

Burp Suite: Do I need the professional edition?

{UPDATE} Keeper Game Hack Free Resources Generator

The Keys To Your Castle, and Your Backdoor, Front door and Side door

Do Casino Player Cards Rigged

Cards

Launching Synchrony — IDO Guidelines

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

More from Medium

Bypassing CrowdStrike in an enterprise production network [in 3 different ways]

MITRE Certification — Security Operations Center Assessment

Risk Management vs. Threat Intelligence-Driven Security Programs

Is a vendor/technology lock-in a security risk?

Risk management is required when you have a vendor and/or technology lock-in.