{"id":6206,"date":"2018-08-11T16:51:40","date_gmt":"2018-08-11T23:51:40","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=6206"},"modified":"2018-08-11T16:51:40","modified_gmt":"2018-08-11T23:51:40","slug":"acalvio-deception-and-the-mitreattack-framework","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2018\/08\/11\/acalvio-deception-and-the-mitreattack-framework\/","title":{"rendered":"Deception and the MITRE Att&#038;ck Framework"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Open Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]ATT&amp;CK can be used as a common behavior-focused adversary model to assess tools, monitoring, and mitigations of existing defenses within an organization&#8217;s enterprise. Learn how deception plays an vital role in this methodology.<br \/>\nDownload the Deception and the MITRE ATT&amp;CK Framework White Paper[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.acalvio.com\/deception-and-the-mitre-attck-framework\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DOWNLOAD NOW&#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.7.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#a21d20&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;|600|||||||&#8221; button_use_icon=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MITRE ATT&#038;CK Framework and Deception focus on common attack behaviors<\/p>\n","protected":false},"author":2,"featured_media":9848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/6206"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/9848"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}