Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Jensen Huang: 'China is going to win the AI race' - Nvidia

      Jensen Huang: ‘China is going to win the AI race’

      6 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      Amazon seeking South African talent for Project Kuiper

      Amazon seeking South African talent for Project Kuiper

      6 November 2025

      Why Google is planning a powerful AI data centre on this tiny Indian Ocean island

      6 November 2025
      Agentic AI is a 'force multiplier' for small businesses - AWS - Rahul Pathak

      Agentic AI is a ‘force multiplier’ for small businesses – AWS

      6 November 2025
    • World
      Apple's new Siri will be powered by ... Google

      Apple’s new Siri will be powered by … Google

      6 November 2025
      WEF warns of bubbles in global economy

      WEF warns of bubbles in global economy

      5 November 2025
      Mastercard plots major push into stablecoins

      Mastercard plots major push into stablecoins

      30 October 2025
      Nvidia takes centre stage in US-China trade chess match - Jensen Huang

      Nvidia takes centre stage in US-China trade chess match

      29 October 2025
      Nvidia and Nokia set sights on 6G

      Nvidia and Nokia set sights on 6G

      29 October 2025
    • In-depth
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
      Why smart glasses keep failing - no, it's not the tech - Mark Zuckerberg

      Why smart glasses keep failing – it’s not the tech

      19 October 2025
      BYD to blanket South Africa with megawatt-scale EV charging network - Stella Li

      BYD to blanket South Africa with megawatt-scale EV charging network

      16 October 2025
      MultiChoice DStv

      As DStv turns 30, it faces its toughest test yet

      6 October 2025
      AMD, OpenAI alliance marks seismic shift in global AI chip race

      AMD, OpenAI alliance marks seismic shift in global AI chip race

      6 October 2025
    • TCS
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025

      TCS+ | Videsha Proothveerajh on Vodacom Business’s new approach to enterprise technology

      28 October 2025
      TCS | The company building a 'living computer' with human cells - Fred Jordan FinalSpark

      TCS | The company building a ‘living computer’ with human cells

      23 October 2025
      TCS | Why South Africans are starting to spend crypto, not just trade it

      TCS | Why South Africans are starting to spend crypto, not just trade it

      22 October 2025
      TCS+ | Managing Sims, saving money: how MSB Micro keeps businesses connected

      TCS+ | Managing Sims, saving money: how MSB Micro keeps businesses connected

      22 October 2025
    • Opinion
      AI takes the throne - Brian Hungwe

      AI takes the throne

      6 October 2025
      The author, Business Leadership South Africa CEO Busi Mavuso

      Trump tariffs and diplomatic missteps push Agoa off the cliff

      6 October 2025
      Duncan McLeod

      Why Capitec should buy Blu Label

      1 October 2025
      AI takes the throne - Brian Hungwe

      AI boom puts Africa at a crossroads

      14 September 2025
      A smarter approach to digital transformation in ICT distribution - Andrew Harris

      A smarter approach to digital transformation in ICT distribution

      15 July 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » What is the Mitre Center for Threat-Informed Defense?

    What is the Mitre Center for Threat-Informed Defense?

    Promoted | Next DLP's Reveal Platform gives businesses the ability to gain true insight into insider risks.
    By Next DLP10 April 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Mitre Engenuity’s Center for Threat-Informed Defense is a privately funded non-profit dedicated to advancing cybersecurity knowledge. It unites global organisations with skilled security teams. Leveraging Mitre ATT&CK, it extends threat-informed defence, a crucial framework enhancing enterprise security operations for both teams and vendors.

    What is the Insider Threat Knowledge Base?

    Mitre’s Center for Threat-Informed Defense, which Next DLP (Next) joined in 2023, established the Insider Threat Knowledge Base (ITKB), a comprehensive repository documenting insiders’ tactics, techniques and procedures (TTPs) to exfiltrate data. This knowledge base empowers insider threat programmes with evidence-based research to enhance their detection and mitigation strategies across a broad spectrum of organisations and sectors.

    Aligning the Reveal Platform with the ITKB

    Insider threats, originating from trusted personnel, pose significant cybersecurity risks. Detecting and preventing these threats is challenging due to their sophisticated tactics. Next’s Reveal Platform provides a robust defence aligned with the Mitre ITKB, aiding organisations in combating this menace effectively. These threats involve diverse malicious or unintentional actions by insiders with legitimate access to organisational assets.

    Deep dive into Next DLP’s Reveal Platform

    Executives hate surprises, particularly unforeseen data events. The Reveal Platform from Next learns what normal data movement and use look like in your environment, distinguishing between a user mistake and malicious intent. It’s a purpose-built solution to help organisations proactively identify and mitigate insider threats. It protects critical assets on and off the network, providing the visibility and control to prevent data loss in business-critical applications.

    Mapping Reveal to the Mitre ITKB

    Next’s Reveal platform aligns with the Mitre ITKB, offering organisations a comprehensive security solution that provides an integrated defence against insider threats. Here’s a breakdown of how Reveal maps to the techniques of the Mitre ITKB:

    1. Data exfiltration

    Mitre’s knowledge base highlights insider threat techniques like data exfiltration via Bluetooth, network, USB, web service to cloud storage, and encrypted network protocol. Reveal monitors data access and movement across these vectors, controlling unauthorised use. This ensures sensitive information remains within the organisation, mitigating the risk of falling into unauthorised hands.

    2. Lateral movement

    Insider threats often move laterally within an organisation to access sensitive data. Based on the centre’s participant-validated evidence, lateral movement of data ATT&CK techniques used by insiders include exploiting remote services, including remote desktop protocol (RDP) and SSH. Reveal goes beyond mere access control by continuously monitoring and analysing user behaviour. It can identify unusual patterns, such as privilege escalation, unauthorised access and lateral movement, offering invaluable insights to counteract potential threats.

    3. Credential misuse

    Mitre recognises credential misuse from password stores and managers in insider threat scenarios. Reveal closely monitors user access and swiftly identifies anomalies in login patterns, making it easier to identify and rectify potential security breaches. As part of an incident-based training programme, Reveal can be used to train employees to double-check links and prompts that may be embedded in phishing e-mails before entering a username and password combination.

    4. Anomaly detection

    Mitre’s Insider Threat Knowledge Base underscores the importance of identifying anomalies in user behaviour, highlighting that malicious insiders use reconnaissance, access and discovery techniques, such as scanning and service and account access, to carry out detrimental activities. Reveal leverages sophisticated machine learning algorithms to detect unusual activities and deviations from established norms. This allows organisations to respond promptly to insider threats, reducing the risk of data breaches and intellectual property theft.

    5. Insider threat indicators

    Reveal correlates various indicators of compromise, from defence evasion to impact techniques, alerting on actions like disabling tools, renaming files and clearing event logs. This aligns with Mitre’s guidance, enhancing threat detection. Organisations can swiftly respond, isolating suspicious endpoints or locking them to mitigate risks, adapting to emerging threats.

    Watch this webinar to learn…

    • What the Mitre ITKB is, how it came about and key learning points from the phase-1 research project.
    • How using the ITKB within the Reveal Platform can provide visibility to the chain of attack and why traditional data loss prevention (DLP) falls short of detecting insider threat activity.
    • Details of the project objectives for phase 2 of the ITKB research programme.

    Conclusion

    Insider threats pose a substantial risk to organisations’ sensitive data and intellectual property. Next’s Reveal Platform provides a robust defence aligned with the Mitre Insider Threat Knowledge Base, ensuring comprehensive protection. By leveraging Reveal, organisations can proactively safeguard assets, detect threats swiftly and respond effectively, establishing a data-centric approach to mitigation. With Reveal, businesses gain true insight into insider risks, empowering them to protect their valuable assets effectively.

    More reading

    • medium.com/mitre-engenuity/launching-a-community-driven-insider-threat-knowledge-base-20a249acb2f
    • mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/insider-threat-ttp-knowledge-base
    • medium.com/mitre-engenuity/inside-out-lets-build-a-community-sourced-insider-threat-knowledge-base-c14a47254852
    • mitre-engenuity.org/wp-content/uploads/2022/12/Insider_Threat_Knowledge_Base.png.webp

    About Next DLP
    Next DLP (“Next”) is a leading insider risk and data protection solution provider. The Reveal Platform by Next uncovers risk, stops data loss, educates employees and fulfils security, compliance and regulatory needs. The company’s leadership brings decades of cyber and technology experience from Fortra (previously HelpSystems), Digital Guardian, Crowdstrike, Forcepoint, Mimecast, IBM, Cisco and Veracode. Next is trusted by organisations big and small, from the Fortune 100 to fast-growing healthcare and technology companies. For more information, visit www.nextdlp.com or connect on LinkedIn.

    • Read more articles by Next DLP on TechCentral
    • This promoted content was paid for by the party concerned


    Mitre Mitre ATT&CK NeXT Next DLP
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleHuawei Luna 2.0 solar solution launched in South Africa
    Next Article Ether surges on US ETF speculation

    Related Posts

    LRMG takes the path to proactive data protection - Nadia Veeran-Patel

    LRMG takes the path to proactive data protection

    17 July 2024
    Recapping an extraordinary month at Next DLP

    Recapping an extraordinary month at Next DLP

    12 June 2024
    Next DLP announces Reveal Beyond

    Next DLP announces Reveal Beyond

    2 May 2024
    Add A Comment

    Comments are closed.

    Company News
    Oni-Tel launches inter-data centre fibre network with Digital Parks Africa

    Oni-Tel launches inter-data centre fibre network with Digital Parks Africa

    6 November 2025
    All-new Huawei nova 14 Series lands in South Africa

    All-new Huawei nova 14 Series lands in South Africa

    6 November 2025
    Smartz Solutions, Cloud On Demand showcase human-centric AI for modern contact centres - Vanda Dickson and Henry McCracken

    Smartz Solutions, Cloud On Demand showcase human-centric AI for modern contact centres

    6 November 2025
    Opinion
    AI takes the throne - Brian Hungwe

    AI takes the throne

    6 October 2025
    The author, Business Leadership South Africa CEO Busi Mavuso

    Trump tariffs and diplomatic missteps push Agoa off the cliff

    6 October 2025
    Duncan McLeod

    Why Capitec should buy Blu Label

    1 October 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Jensen Huang: 'China is going to win the AI race' - Nvidia

    Jensen Huang: ‘China is going to win the AI race’

    6 November 2025
    TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

    TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

    6 November 2025
    Amazon seeking South African talent for Project Kuiper

    Amazon seeking South African talent for Project Kuiper

    6 November 2025

    Why Google is planning a powerful AI data centre on this tiny Indian Ocean island

    6 November 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}