Cookies Policy
We use strictly necessary cookies whilst you are here. These are to enable the website to work and cannot be disabled. To read more about what this means, please see our Privacy Policy.

Partnered with
DISARM Foundation.

Arachne Digital is proud to partner with the DISARM Foundation as the inaugural member of their Partner Programme, launched at the beginning of 2024.

Introduction

Arachne 
Digital 
& 
DISARM 
Foundation 
Partnership 
for 
Disinformation 
Defense

The DISARM Foundation is immensely grateful to welcome Arachne Digital as the first member of our Partner Programme, launched at the beginning of 2024.

Arachne Digital has been a pioneer in helping us build a partner community that supports the small but dedicated nonprofit team responsible for maintaining and enhancing the DISARM Framework. Their support is crucial to ensuring that the framework remains free and continuously updated to keep pace with the ever-evolving disinformation landscape. Arachne Digital also provides valuable feedback on existing elements and proposed changes, while promoting DISARM and its integration into their own operations, encouraging wider adoption within the defender community.

From ATT&CK to DISARM

Nearly a decade ago, a team of cybersecurity experts at the US National Security Agency (NSA) recognized the need for a common taxonomy to address fundamental cybersecurity questions, leading to the creation of the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework. This framework revolutionized the defender community by facilitating the categorization, combination, and sharing of threat intelligence, thereby enabling more timely and effective responses.

As adversaries have evolved, combining cyberattacks with disinformation, social engineering, and information manipulation to undermine democracies, the need for a similar taxonomy for influence operations became evident. The DISARM Framework was developed to meet this need, allowing defenders to share detailed information about threat actor behaviour and develop coordinated, targeted responses.

Global Adoption & Red-Blue Approach

Nearly a decade ago, a team of cybersecurity experts at the US National Security Agency (NSA) recognized the need for a common taxonomy to address fundamental cybersecurity questions, leading to the creation of the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework. This framework revolutionized the defender community by facilitating the categorization, combination, and sharing of threat intelligence, thereby enabling more timely and effective responses.

As adversaries have evolved, combining cyberattacks with disinformation, social engineering, and information manipulation to undermine democracies, the need for a similar taxonomy for influence operations became evident. The DISARM Framework was developed to meet this need, allowing defenders to share detailed information about threat actor behaviour and develop coordinated, targeted responses.

Global Adoption & Red-Blue Approach

The DISARM Foundation collaborates with a global community of partners to promote the adoption of the framework across government, civil society, and industry. DISARM is actively being used by the EU Agency for Cybersecurity, the European Commission, NATO’s Hybrid and StratCom Centers of Excellence, and the governments of the United States, Canada, France, the United Kingdom, and Lithuania. DISARM is also actively used by the EU Code of Practice on Disinformation signatories including Meta, Google, Microsoft, the Digital Forensics Research Lab, and the MITRE Corporation.

DISARM applies the ‘Red’ and ‘Blue’ approach from cybersecurity and MITRE ATT&CK. Adversarial behaviours are categorized as Red, while appropriate countermeasures, mapped to Red TTPs, are reflected in Blue. This dual approach helps us understand and act collectively.

Understanding & Acting on Threat Intelligence

The ‘understanding’ aspect involves how we search, identify, capture, categorize, and analyse data to comprehend threats. It also encompasses how we share this data and insights, essentially answering the ‘who, what, when, where, why, and how’ of threat intelligence.

The ‘acting’ aspect focuses on forming a collective view of necessary actions, understanding what each entity can do individually and collaboratively, and implementing proactive and reactive measures based on our shared understanding.

While significant progress has been made, much work remains, particularly in developing the Blue component. This includes building out ‘actor types’ and mapping them to Blue actions. The DISARM Foundation deeply appreciates the vital partnership and support of Arachne Digital and others in our Partner Programme as we continue this critical work.

stay secure

Know 
who 
your 
threats 
are, 
talk 
to 
one 
of 
our 
experts 
at 
Arachne.

Bespoke consulting tailored to your organisation’s needs, covering the operationalisation of Arachne Digital data.
https://cms.arachnedigital.thedevguys.co.nz/wp-content/uploads/2024/08/395611ad1be38a42ffc7c02910398568.png

Timely 
and 
actionable 
cyber 
threat 
intelligence.

Newsletter
Stay in the loop with our latest updates, exclusive offers, and content by subscribing to our newsletter.

© 2024 Arachne.Digital, ALL RIGHTS RESERVED
Built by