From ed6127ada11b8b6eb5d5ae152cd78fcc2f07ded8 Mon Sep 17 00:00:00 2001 From: Sascha Rommelfangen Date: Mon, 28 Oct 2019 14:18:48 +0100 Subject: [PATCH] headline modified --- _posts/2019-10-27-visualising_common_patterns_attack.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_posts/2019-10-27-visualising_common_patterns_attack.md b/_posts/2019-10-27-visualising_common_patterns_attack.md index 226a31d..fb6b01b 100644 --- a/_posts/2019-10-27-visualising_common_patterns_attack.md +++ b/_posts/2019-10-27-visualising_common_patterns_attack.md @@ -1,10 +1,10 @@ --- -title: Visualising common patterns within MISP and ATT&CK data +title: Visualising common patterns using MISP and ATT&CK data layout: post featured: /assets/images/misp/blog/visualisation_cylance_attack/actor_delta.png --- -# Visualising common patterns within MISP and ATT&CK data +# Visualising common patterns using MISP and ATT&CK data Having access to a large amount of Threat information through MISP Threat Sharing communities, gives you outstanding opportunities to aggregate this information and take the process of trying to understand how all this data fits together tell a broader story to the next level. We are transforming technical data or indicators of compromise (IOCs) into Cyber Threat Intel. This is where the analytical challenge begins.