Iran Cyber Threat Assessment and Defensive Guidance

Iran Cyber Threat Assessment and Defensive Guidance

As hostilities between Israel and Iran resumed earlier this month, sources warned of cyber activity stemming from the conflict. Recent escalation has likely raised additional concerns (or at least questions) about what ...
Turning Up the Heat on ATT&CK Heatmaps to Address Residual Risk

Turning Up the Heat on ATT&CK Heatmaps to Address Residual Risk

Stepping into a time machine and traveling back to the past, during the last half of my nearly 20 year career at MITRE I served in a variety of roles that spanned the ...
Small but Mighty: UX Design Tips for a Lean Team Environment

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry colleagues on how to work effectively in a lean team environment. Lean teams typically ...
Taming the Machine: Putting Security at the Core of Generative AI

Taming the Machine: Putting Security at the Core of Generative AI

AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to develop applications faster through task automation and information processing. Speed to innovation is so prized that the ...
Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat landscape is expanding and evolving. The volume of threats continues to increase, especially ...
All Exposures Aren’t Equal: The More Effective Path to CTEM

All Exposures Aren’t Equal: The More Effective Path to CTEM

CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to mitigate risk. It also includes capabilities like Threat-Informed Defense (TID) and Breach and Attack Simulation (BAS) that work ...
Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber

Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber

ATT&CK v17  We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17 version of MITRE ATT&CK. Like we do with every ATT&CK update, ...
Knowing Your Defenses Beyond a Vulnerability Focused Approach to CTEM

Knowing Your Defenses Beyond a Vulnerability Focused Approach to CTEM

The chaotic world of cybersecurity where the threats from nation-states, cyber gangs, botnet operators, and APT groups are real, has created an extensive landscape of cybersecurity tools and approaches to reduce risk ...