Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-select1 of 4
Domains · Ball in pillar
49 sources · matching filters · sorted by citation density
Sort
BApplied AI in Security49 sources
01

Catalog of security and privacy controls for information systems and organizations. The foundation for federal security compliance.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
02

Official guide to effective prompt engineering with Claude. Covers system prompts, chain-of-thought, few-shot examples, and best practices.

GuideFoundationalB8 · Prompt Engineering for SecurityNEW · 1mo ago
Test your knowledge · B8
03

Computer security incident handling guide covering detection, analysis, containment, eradication, and recovery.

Test your knowledge · B1
04

Data-driven model for estimating the probability that a vulnerability will be exploited in the wild. Uses ML to prioritize patching.

ToolIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
05

Knowledge base of adversary tactics and techniques based on real-world observations. The industry standard for threat modeling.

Test your knowledge · B5
06

The most comprehensive open-source guide for web application security testing. Covers testing methodology, tools, and techniques.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
07

Generic signature format for SIEM systems. Documentation on writing, testing, and deploying detection rules.

Test your knowledge · B8
08

Comprehensive survey of ML applications in cybersecurity. Covers supervised/unsupervised approaches for intrusion detection, malware analysis, phishing detection. Maps ML techniques to security use cases with performance benchmarks.

Test your knowledge · B1
09

Open-source testing framework and toolkit for AI governance. Helps organizations validate AI systems against governance principles.

Test your knowledge · B7
10

Public database tracking real-world AI incidents and controversies. Invaluable for risk assessment and governance case studies.

Test your knowledge · B6
11

Techniques for effective prompting including for safety and security use cases. Covers system prompts, chain-of-thought, and reducing hallucination.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
12

Evaluates model capabilities for autonomous cyber operations at each AI Safety Level (ASL). Defines thresholds where AI capability in offensive security requires additional safeguards. Key reference for responsible AI in offensive security.

Test your knowledge · B4
13

Research on using AI for penetration testing automation: reconnaissance, vulnerability discovery, exploit generation. Practitioner perspective on what's practical vs. theoretical.

GuideIntermediateB4 · AI in Offensive SecurityC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · B4
14

Authoritative list of vulnerabilities actively exploited in the wild. Used for prioritizing remediation — required for federal agencies.

FrameworkFoundationalB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
15

CISA's decision-tree approach to vulnerability prioritization. Considers exploitation status, automatable exposure, and mission impact.

FrameworkIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
16
MLflowDatabricks

Open-source platform for managing the end-to-end ML lifecycle. Covers experiment tracking, model registry, and deployment.

Test your knowledge · B7
17

Open-source detection rules for Elastic Security. Covers a wide range of attack techniques mapped to MITRE ATT&CK.

Test your knowledge · B1
18

Law enforcement perspective on how LLMs enable cybercrime (phishing, malware, social engineering) and how AI assists threat intelligence and investigation.

Test your knowledge · B5
19

Open-source platform for managing cyber threat intelligence. Integrates with MITRE ATT&CK and STIX/TAXII.

ToolIntermediateB5 · AI for Threat IntelligenceNEW · 1mo ago
Test your knowledge · B5
20

Common Vulnerability Scoring System version 4.0. The standard method for rating the severity of security vulnerabilities.

FrameworkIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
21

Evaluation criteria for AI/ML platforms including security features. Good for questions about what to look for when evaluating AI security tooling.

ResearchIntermediateB7 · AI Security Tool LandscapeNEW · 22d ago
Test your knowledge · B7
22

Market categorization of AI security tools: model monitoring, adversarial robustness, privacy, compliance. Useful for understanding the vendor landscape without favoring specific vendors.

Test your knowledge · B7
23

Sec-PaLM and Security AI Workbench for threat intelligence summarization and detection. Shows how LLMs are being applied to SOC workflows — not just pattern matching but contextual threat analysis.

Test your knowledge · B1
24

Research on using LLMs for automated triage, alert correlation, and response orchestration. Includes studies on analyst productivity gains and error reduction.

Test your knowledge · B2
25

Annual survey data on AI adoption in audit, risk, and compliance functions. Adoption rates, barriers, trust levels. Practitioner perspective on AI-augmented GRC.

ResearchIntermediateB6 · AI for GRC & ComplianceNEW · 22d ago
Test your knowledge · B6
26

LLM-powered security assistant. Technical docs cover prompt engineering for security, incident summarization, KQL generation. Useful for questions about practical LLM integration in SOC, not product features.

Test your knowledge · B1
27

MITRE's automated adversary emulation platform. Runs pre-defined or custom attack sequences to test defenses.

Test your knowledge · B4
28

Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.

Test your knowledge · B5
29

Knowledge graph of cybersecurity countermeasures. Maps defensive techniques to the ATT&CK techniques they counter.

Test your knowledge · B1
30

Workshop proceedings covering the bidirectional relationship between AI and security. Sections on automation risks (adversarial evasion of AI detectors, automation bias in SOC).

Test your knowledge · B2
31

The U.S. government repository of standards-based vulnerability management data. Includes CVE entries, severity scores, and affected product references.

FrameworkFoundationalB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
32

NVIDIA's open-source toolkit for adding programmable guardrails to LLM applications. Supports input/output validation and topic control.

Test your knowledge · B7
33

International principles for responsible AI adopted by 46 countries. Covers inclusive growth, transparency, accountability, and security.

FrameworkFoundationalB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
34

Official guidance on prompt construction, system prompts, and safety. The baseline for understanding prompt engineering before adding security-specific techniques.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
35

Comprehensive guide covering AI security threats, privacy risks, and practical controls for AI-powered applications.

Test your knowledge · B7
36

Detailed testing techniques for identifying web vulnerabilities. Practical, hands-on approach to security assessment.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
37

SOAR platform with 800+ integrations. The playbook marketplace shows real-world automation patterns: phishing triage, enrichment, containment. Useful for understanding what's actually automatable vs. aspirational.

GuideIntermediateB2 · AI-Driven Security AutomationNEW · 22d ago
Test your knowledge · B2
38

Practical governance framework providing guidance on deploying AI responsibly. Includes implementation checklists.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
39

Bug bounty platform focused on AI/ML vulnerabilities. Real-world vulnerability data in ML frameworks and models. Good for grounding tool security questions in actual discovered vulnerabilities.

Test your knowledge · B7
40

Comprehensive standard for penetration testing methodology. Covers intelligence gathering, threat modeling, vulnerability analysis, exploitation, and reporting.

FrameworkFoundationalB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
41

Analysis of how NLP/LLMs are being used for automated threat intelligence: dark web monitoring, malware family classification, campaign attribution. Practical applications beyond the hype.

GuideIntermediateB5 · AI for Threat IntelligenceNEW · 22d ago
Test your knowledge · B5
42
Atomic Red TeamRed Canary

Library of tests mapped to the MITRE ATT&CK framework. Small, portable detection tests for validating security controls.

Test your knowledge · B4
43

Practitioner-oriented guide to using LLMs in security workflows: log analysis, detection rule writing, incident triage, report generation. Practical prompt templates for security tasks.

GuideIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
44

Demonstrated GPT-4 exploiting real-world web vulnerabilities autonomously. 73% success rate on day-one CVEs. Key reference for questions about AI-augmented offensive capabilities and the asymmetry debate.

Test your knowledge · B4
45

Analysis of how LLMs can be used for offensive security tasks and the implications for defensive guardrails. Covers the dual-use nature of security LLMs.

Test your knowledge · B4
46

Comprehensive taxonomy of 58+ prompting techniques with effectiveness analysis. Covers chain-of-thought, few-shot, self-consistency, and adversarial prompting. Academic grounding for prompt engineering questions.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
47

Annual threat landscape reports with empirical data on vulnerability exploitation timelines, patch adoption rates, and the efficacy of risk-based prioritization. Use for data-driven questions, not vendor comparisons.

GuideIntermediateB3 · AI for Vulnerability ManagementNEW · 22d ago
Test your knowledge · B3
48

Platform for ML experiment tracking, model versioning, and collaborative model development with security considerations.

Test your knowledge · B7
49

U.S. Executive Order (Oct 2023) establishing AI safety requirements, red-teaming standards, and reporting obligations for frontier AI systems.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.