CardinalOps
  • Platform
  • Use Cases

    Use Cases

    • Map all your detections to MITRE ATT&CK
    • Gain new detections to address critical gaps
    • Identify and fix broken rules
    • Pinpoint root causes of noisy rules
    • Save costs and rationalize your entire security stack
    • Measure the depth of ATT&CK coverage
    • Automate to gain agility and address hiring challenges
    • Jumpstart cloud monitoring for your SOC
    • Report on detection posture to leadership and auditors
    • Manage detection posture across multiple SIEMs
  • Integrations
  • Company

    Company

    • Who we are

      Meet the leadership team, advisors, investors, and mission that drive us forward.

    • Why work here

      Big challenges need big thinkers. Are you up to it?

    • Careers

      Your opportunity to make a difference … for our customers, the world, and yourself.

    • Security & Compliance

      We value the privacy and security of your data.

  • Resources

    Resources

    • Newsroom
    • Blog
    • White Papers & Videos
    • Webinars & Events
  • Contact Us
  • Book a Demo
HOME Resources
  • Blog
  • Newsroom
  • Webinars & Events
  • White Papers & Videos
  • Detection Engineering Best Practices for Implementing a Threat-Informed Defense

    Detection Engineering Best Practices for Implementing a Threat-Informed Defense

    In this paper, SANS Director of Emerging Security Trends, John Pescatore, compiles data from the recent SANS survey of 267 cybersecurity professionals to determine the state of practice in detection engineering.

  • A CISO’s Perspective on Improving SecOps Effectiveness

    A CISO’s Perspective on Improving SecOps Effectiveness

    Repsol aims for net-zero emissions by 2050 but faces growing cybersecurity challenges. Read this executive summary to learn how they use automation, threat intelligence and CardinalOps for enhanced security.

  • The Scariest Cybersecurity Stats of 2023 – Key Findings from a Roundup of Reports

    The Scariest Cybersecurity Stats of 2023 – Key Findings from a Roundup of Reports

    This roundup of reports reveals some of the scariest cybersecurity stats from CardinalOps’s State of SIEM 2023 Report and other cybersecurity researchers in 2023.

  • Israeli Cybersecurity Startups: Impact of a Growing Conflict

    Israeli Cybersecurity Startups: Impact of a Growing Conflict

    Michael Mumcuoglu, CEO and co-founder at CardinalOps, said the main focus during this “difficult and heartbreaking time” has been on supporting the company’s Israeli team and their families.

  • Global 500 Energy Company Repsol Selects CardinalOps to Enhance Detection Posture and Reduce Risk of Breaches

    Global 500 Energy Company Repsol Selects CardinalOps to Enhance Detection Posture and Reduce Risk of Breaches

    “CardinalOps delivers the breadth of security coverage that we need to fix our detection gaps, resulting in a more secure environment and efficient security operations,” said Javier García Quintela, Global CISO of Repsol.

  • A CISO’s Perspective on Improving SecOps Effectiveness

    A CISO’s Perspective on Improving SecOps Effectiveness

    Join us on September 28 at 11:00 am EDT to learn from Javier García Quintela, Repsol’s Global CISO, as he shares strategies to mitigate risks of ransomware, breaches, and insider threats using automation and analytics.

  • North Korean Attackers Penetrated Russian Rocket

    North Korean Attackers Penetrated Russian Rocket

    “It’s not surprising that nation-state attackers were able to break into the network of a Russian design bureau so they could exfiltrate sensitive information,” said Phil Neray, vice president of Cyber Defense Strategy at CardinalOps.

  • Cuba ransomware group observed exploiting high-severity Veeam bug

    Cuba ransomware group observed exploiting high-severity Veeam bug

    Phil Neray of CardinalOps suggests that “organizations should protect themselves by implementing granular monitoring with detections that cover all of these adversary techniques and look for unusual or unauthorized access to backups.”

  • Cuba Ransomware Group Exploiting Veeam Flaw in Latest Campaign

    Cuba Ransomware Group Exploiting Veeam Flaw in Latest Campaign

    A skilled, high-profile Cuban ransomware group employed “29 different MITRE ATT&CK techniques as they navigated the kill chain from initial access to defense evasion and lateral movement,” according to Phil Neray of CardinalOps.

  • Critical Flaws in PowerShell Gallery Enable Malicious Exploits

    Critical Flaws in PowerShell Gallery Enable Malicious Exploits

    Phil Neray of CardinalOps describes the Aqua Nautilus vulnerability persisting within the PowerShell Gallery as “a classic supply-chain challenge when using open source code…” Neray offers an approach to help prevent attacks.

  • Using Automation to Hunt for the Elusive LOLBAS

    Using Automation to Hunt for the Elusive LOLBAS

    The latest LOLBAS attacks are “innovative” and “difficult to detect” according to Phil Neray, VP of Cyber Defense Strategy at CardinalOps. Detection will require “machine learning that figures out how to spot suspicious activity.”

  • The Gately Report: Black Hat USA Edition

    The Gately Report: Black Hat USA Edition

    The Gately Report: Black Hat USA Edition highlighted Gartner’s recognition of CardinalOps as a Sample Vendor for automated security controls assessment (ASCA) as a “revenue opportunity for partners in many different ways.”

1 2 3 4
Next Page

Boost productivity 10x … Really?

CardinalOps’ detection posture management platform maximizes your MITRE ATT&CK coverage for the latest threats and eliminates hidden detection gaps which you may not even know you have. Setup takes less than an hour because there are no agents to deploy or appliances to configure, and it easily connects via the native APIs of your SIEM/XDR. What’s more, it helps boost your detection engineering team’s productivity 10x compared to manual processes.

Yes, really.

Book a Demo
CardinalOps
  • Privacy Policy
  • Terms & Conditions
  • Security & Compliance

©2023 CardinalOps