misp-website/data/testimonials/2.yaml

5 lines
524 B
YAML
Raw Normal View History

text: "Many MISP [galaxy clusters](datamodels/#misp-galaxy) are already available like MITRE ATT&CK, Exploit-Kit, Microsoft Activity Group actor, Preventive Measure, Ransomware, TDS, Threat actor or Tool used by adversaries. \n\n[Taxonomies](datamodels/#misp-taxonomies) provide a set of already defined classifications modeling estimative language, CSIRTs/CERTs classifications, national classifications or threat model classification."
2021-12-24 08:01:23 +01:00
name: "MISP Galaxies & Taxonomies"
position: ""
avatar: "img/testimonials/galaxy.png"