Enterprise Edition

Security Without Guesswork: Calculating and Reducing Residual Risk
We’re staunch believers in the adage: ...

Iran Cyber Threat Assessment and Defensive Guidance
As hostilities between Israel and Iran resumed earlier this month, sources warned of cyber activity stemming from the conflict. Recent escalation has likely raised additional concerns (or at least questions) about what ...

Turning Up the Heat on ATT&CK Heatmaps to Address Residual Risk
Stepping into a time machine and traveling back to the past, during the last half of my nearly 20 year career at MITRE I served in a variety of roles that spanned the ...

Raise the Bar as Attackers Lower the Barrier to Entry
By Frank Duff, Tidal Cyber and Matt Polak, Vanish ID ...

Small but Mighty: UX Design Tips for a Lean Team Environment
As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry colleagues on how to work effectively in a lean team environment. Lean teams typically ...

Taming the Machine: Putting Security at the Core of Generative AI
AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to develop applications faster through task automation and information processing. Speed to innovation is so prized that the ...

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization
I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat landscape is expanding and evolving. The volume of threats continues to increase, especially ...

All Exposures Aren’t Equal: The More Effective Path to CTEM
CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to mitigate risk. It also includes capabilities like Threat-Informed Defense (TID) and Breach and Attack Simulation (BAS) that work ...

Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber
ATT&CK v17 We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17 version of MITRE ATT&CK. Like we do with every ATT&CK update, ...

Knowing Your Defenses Beyond a Vulnerability Focused Approach to CTEM
The chaotic world of cybersecurity where the threats from nation-states, cyber gangs, botnet operators, and APT groups are real, has created an extensive landscape of cybersecurity tools and approaches to reduce risk ...