AI Security, Cloud Security, Security Operations, Vulnerability Intelligence

Map AI misuse and model abuse signals to MITRE ATLAS without hype

This tutorial guides East Asia-facing security teams on how to map observed AI misuse and model abuse signals to MITRE ATLAS techniques using a structured, uncertainty-aware approach. It emphasizes separating public facts from speculation, assigning clear ownership, and establishing flexible review workflows without relying on numeric thresholds or rigid escalation rules.

Read more

Cloud Security, Identity & Governance, Security Operations, Vulnerability Intelligence

SLSA questions to ask when a supplier claims ‘secure build pipeline’

Use the SLSA framework to evaluate supplier build integrity through neutral questions on provenance, signing, reproducibility, dependency pinning, and evidence artifacts—without accepting marketing claims as proof. This checklist supports East Asia-facing security, cloud, and supply-chain teams in verifying supplier assertions.

Read more

Cloud Security, Identity & Governance, Security Operations, Vulnerability Intelligence

Building an Internal Patch-SLA Queue from Korea KISA/KrCERT Vulnerability Notices: A Practical Workflow Guide

Organizations can transform Korea KISA/KrCERT vulnerability notices into an auditable internal patch-SLA workflow by establishing clear triage steps, ownership rules, severity interpretation, exception tracking, and integration with existing vulnerability management systems—without imposing rigid thresholds or inventing unsupported procedures.

Read more

Cloud Security, Incidents & Breaches, Security Operations, Vulnerability Intelligence

Map an East Asia incident write-up to MITRE ATT&CK without overclaiming

This tutorial guides security teams in East Asia and globally on how to map public incident reports to MITRE ATT&CK techniques while preserving uncertainty, avoiding unwarranted attribution, and maintaining evidence traceability. It provides step-by-step workflow guidance for analysts, threat intel teams, and incident responders to use ATT&CK as a neutral taxonomy for structuring findings without inflaming confidence beyond what the source supports.

Read more

AI Security, Cloud Security, Incidents & Breaches, Vulnerability Intelligence

What to extract from a ransomware leak post without amplifying it

This checklist guides security teams in East Asia and globally on how to extract verifiable, low-risk intelligence from ransomware leak posts—focusing on entity identifiers, proof types, data categories, verification steps, and clear escalation paths—while avoiding amplification of unverified claims or harmful re-sharing.

Read more

Cloud Security, Identity & Governance, Security Operations, Vulnerability Intelligence

Use the CISA KEV catalog to build an East Asia supplier patch watchlist

This practical tutorial guides security teams in using the CISA Known Exploited Vulnerabilities (KEV) catalog to create a focused, actionable patch watchlist for East Asia-based suppliers. It outlines steps to map KEVs to supplier software inventories, assign ownership, set flexible escalation thresholds, and maintain evidence records—without relying on numeric thresholds or rigid schedules.

Read more