Where every claim in SecProve
comes from.
A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.
Catalog of security and privacy controls for information systems and organizations. The foundation for federal security compliance.
Test your knowledge · B6Official guide to effective prompt engineering with Claude. Covers system prompts, chain-of-thought, few-shot examples, and best practices.
Test your knowledge · B8Computer security incident handling guide covering detection, analysis, containment, eradication, and recovery.
Data-driven model for estimating the probability that a vulnerability will be exploited in the wild. Uses ML to prioritize patching.
Test your knowledge · B3Knowledge base of adversary tactics and techniques based on real-world observations. The industry standard for threat modeling.
Test your knowledge · B5The most comprehensive open-source guide for web application security testing. Covers testing methodology, tools, and techniques.
Test your knowledge · B4Generic signature format for SIEM systems. Documentation on writing, testing, and deploying detection rules.
Test your knowledge · B8Comprehensive survey of ML applications in cybersecurity. Covers supervised/unsupervised approaches for intrusion detection, malware analysis, phishing detection. Maps ML techniques to security use cases with performance benchmarks.
Open-source testing framework and toolkit for AI governance. Helps organizations validate AI systems against governance principles.
Test your knowledge · B7Public database tracking real-world AI incidents and controversies. Invaluable for risk assessment and governance case studies.
Test your knowledge · B6Techniques for effective prompting including for safety and security use cases. Covers system prompts, chain-of-thought, and reducing hallucination.
Test your knowledge · B8Evaluates model capabilities for autonomous cyber operations at each AI Safety Level (ASL). Defines thresholds where AI capability in offensive security requires additional safeguards. Key reference for responsible AI in offensive security.
Research on using AI for penetration testing automation: reconnaissance, vulnerability discovery, exploit generation. Practitioner perspective on what's practical vs. theoretical.
Test your knowledge · B4Authoritative list of vulnerabilities actively exploited in the wild. Used for prioritizing remediation — required for federal agencies.
Test your knowledge · B3CISA's decision-tree approach to vulnerability prioritization. Considers exploitation status, automatable exposure, and mission impact.
Test your knowledge · B3Open-source platform for managing the end-to-end ML lifecycle. Covers experiment tracking, model registry, and deployment.
Test your knowledge · B7Open-source detection rules for Elastic Security. Covers a wide range of attack techniques mapped to MITRE ATT&CK.
Test your knowledge · B1Law enforcement perspective on how LLMs enable cybercrime (phishing, malware, social engineering) and how AI assists threat intelligence and investigation.
Test your knowledge · B5Open-source platform for managing cyber threat intelligence. Integrates with MITRE ATT&CK and STIX/TAXII.
Test your knowledge · B5Common Vulnerability Scoring System version 4.0. The standard method for rating the severity of security vulnerabilities.
Test your knowledge · B3Evaluation criteria for AI/ML platforms including security features. Good for questions about what to look for when evaluating AI security tooling.
Test your knowledge · B7Market categorization of AI security tools: model monitoring, adversarial robustness, privacy, compliance. Useful for understanding the vendor landscape without favoring specific vendors.
Test your knowledge · B7Sec-PaLM and Security AI Workbench for threat intelligence summarization and detection. Shows how LLMs are being applied to SOC workflows — not just pattern matching but contextual threat analysis.
Research on using LLMs for automated triage, alert correlation, and response orchestration. Includes studies on analyst productivity gains and error reduction.
Annual survey data on AI adoption in audit, risk, and compliance functions. Adoption rates, barriers, trust levels. Practitioner perspective on AI-augmented GRC.
Test your knowledge · B6LLM-powered security assistant. Technical docs cover prompt engineering for security, incident summarization, KQL generation. Useful for questions about practical LLM integration in SOC, not product features.
MITRE's automated adversary emulation platform. Runs pre-defined or custom attack sequences to test defenses.
Test your knowledge · B4Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.
Knowledge graph of cybersecurity countermeasures. Maps defensive techniques to the ATT&CK techniques they counter.
Workshop proceedings covering the bidirectional relationship between AI and security. Sections on automation risks (adversarial evasion of AI detectors, automation bias in SOC).
Test your knowledge · B2The U.S. government repository of standards-based vulnerability management data. Includes CVE entries, severity scores, and affected product references.
Test your knowledge · B3NVIDIA's open-source toolkit for adding programmable guardrails to LLM applications. Supports input/output validation and topic control.
Test your knowledge · B7International principles for responsible AI adopted by 46 countries. Covers inclusive growth, transparency, accountability, and security.
Test your knowledge · B6Official guidance on prompt construction, system prompts, and safety. The baseline for understanding prompt engineering before adding security-specific techniques.
Test your knowledge · B8Comprehensive guide covering AI security threats, privacy risks, and practical controls for AI-powered applications.
Test your knowledge · B7Detailed testing techniques for identifying web vulnerabilities. Practical, hands-on approach to security assessment.
Test your knowledge · B4SOAR platform with 800+ integrations. The playbook marketplace shows real-world automation patterns: phishing triage, enrichment, containment. Useful for understanding what's actually automatable vs. aspirational.
Test your knowledge · B2Practical governance framework providing guidance on deploying AI responsibly. Includes implementation checklists.
Test your knowledge · B6Bug bounty platform focused on AI/ML vulnerabilities. Real-world vulnerability data in ML frameworks and models. Good for grounding tool security questions in actual discovered vulnerabilities.
Test your knowledge · B7Comprehensive standard for penetration testing methodology. Covers intelligence gathering, threat modeling, vulnerability analysis, exploitation, and reporting.
Test your knowledge · B4Analysis of how NLP/LLMs are being used for automated threat intelligence: dark web monitoring, malware family classification, campaign attribution. Practical applications beyond the hype.
Test your knowledge · B5Library of tests mapped to the MITRE ATT&CK framework. Small, portable detection tests for validating security controls.
Test your knowledge · B4Practitioner-oriented guide to using LLMs in security workflows: log analysis, detection rule writing, incident triage, report generation. Practical prompt templates for security tasks.
Test your knowledge · B8Demonstrated GPT-4 exploiting real-world web vulnerabilities autonomously. 73% success rate on day-one CVEs. Key reference for questions about AI-augmented offensive capabilities and the asymmetry debate.
Test your knowledge · B4Analysis of how LLMs can be used for offensive security tasks and the implications for defensive guardrails. Covers the dual-use nature of security LLMs.
Comprehensive taxonomy of 58+ prompting techniques with effectiveness analysis. Covers chain-of-thought, few-shot, self-consistency, and adversarial prompting. Academic grounding for prompt engineering questions.
Test your knowledge · B8Annual threat landscape reports with empirical data on vulnerability exploitation timelines, patch adoption rates, and the efficacy of risk-based prioritization. Use for data-driven questions, not vendor comparisons.
Test your knowledge · B3Platform for ML experiment tracking, model versioning, and collaborative model development with security considerations.
Test your knowledge · B7U.S. Executive Order (Oct 2023) establishing AI safety requirements, red-teaming standards, and reporting obligations for frontier AI systems.
Test your knowledge · B6Ready to test what you've learned?
Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.