Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
13 sources · matching filters · sorted by citation density
Sort
ACybersecurity1 source
01

Curated newsletter covering detection engineering practices, tools, and techniques. Practical resource for SOC and detection teams.

Test your knowledge · A11
BApplied AI in Security12 sources
01

Computer security incident handling guide covering detection, analysis, containment, eradication, and recovery.

Test your knowledge · B1
02

Knowledge base of adversary tactics and techniques based on real-world observations. The industry standard for threat modeling.

Test your knowledge · B5
03

Generic signature format for SIEM systems. Documentation on writing, testing, and deploying detection rules.

Test your knowledge · B8
04

Comprehensive survey of ML applications in cybersecurity. Covers supervised/unsupervised approaches for intrusion detection, malware analysis, phishing detection. Maps ML techniques to security use cases with performance benchmarks.

Test your knowledge · B1
05

Open-source detection rules for Elastic Security. Covers a wide range of attack techniques mapped to MITRE ATT&CK.

Test your knowledge · B1
06

Sec-PaLM and Security AI Workbench for threat intelligence summarization and detection. Shows how LLMs are being applied to SOC workflows — not just pattern matching but contextual threat analysis.

Test your knowledge · B1
07

Research on using LLMs for automated triage, alert correlation, and response orchestration. Includes studies on analyst productivity gains and error reduction.

Test your knowledge · B2
08

LLM-powered security assistant. Technical docs cover prompt engineering for security, incident summarization, KQL generation. Useful for questions about practical LLM integration in SOC, not product features.

Test your knowledge · B1
09

MITRE's automated adversary emulation platform. Runs pre-defined or custom attack sequences to test defenses.

Test your knowledge · B4
10

Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.

Test your knowledge · B5
11

Knowledge graph of cybersecurity countermeasures. Maps defensive techniques to the ATT&CK techniques they counter.

Test your knowledge · B1
12
Atomic Red TeamRed Canary

Library of tests mapped to the MITRE ATT&CK framework. Small, portable detection tests for validating security controls.

Test your knowledge · B4

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.