<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MITRE on Riskitera Blog</title><link>https://blog.riskitera.com/en/tags/mitre/</link><description>Recent content in MITRE on Riskitera Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 30 Apr 2026 11:50:10 +0200</lastBuildDate><atom:link href="https://blog.riskitera.com/en/tags/mitre/index.xml" rel="self" type="application/rss+xml"/><item><title>MITRE ATT&amp;CK: What It Is and How to Use It in Your Organization</title><link>https://blog.riskitera.com/en/posts/2026/04/mitre-attack-framework-guide/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.riskitera.com/en/posts/2026/04/mitre-attack-framework-guide/</guid><description>&lt;p>&lt;a href="https://attack.mitre.org/">MITRE ATT&amp;amp;CK&lt;/a> has become the global standard for understanding, classifying, and communicating the tactics and techniques used by adversaries in real-world cyberattacks. Maintained by MITRE Corporation, this open knowledge base documents the behavior of over 140 threat groups and catalogs hundreds of techniques observed in actual incidents. For any organization aiming for a mature security posture, learning and applying MITRE ATT&amp;amp;CK is not optional: it is an operational necessity.&lt;/p></description></item></channel></rss>