-
[Upcoming] Dark Reading Virtual Event – Anatomy of a Data Breach: And What To Do If It Happens to You
Join us for the “How Attackers Target Today’s Hybrid Endpoints” session. Top experts, including Phil Neray, VP of Cyber Defense Strategy at CardinalOps, will provide insights into threats to the ever-evolving endpoint.
-
Leading Financial Services Organization Uses CardinalOps to Continuously Audit and Remediate Detection Coverage Gaps
Tel Aviv Stock Exchange has deployed the CardinalOps platform to identify and remediate missing, broken, and noisy detections, enabling a proactive, threat-informed defense tied to the risks most relevant to them.
-
Gartner® Report: Implement a Continuous Threat Exposure Management (CTEM) Program
Read this complimentary report on Security Operations to get recommendations from Gartner® on implementing a Continuous Threat Exposure Management (CTEM) Program.
-
Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks
Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.
-
[Upcoming] Webcast: SANS 2023 SOC Survey
Join us on June 13 for a webinar hosted with SANS. With survey data from active SOC managers and analysts, this webcast will cover the 6th edition of the SANS 2023 SOC Survey.
-
[Upcoming] The Future of Risk-Based Detection
Join us on June 20 at 3:30 pm EDT for this SANS webinar. SecOps experts discuss major challenges for the modern Security Operations Center and how to operationalize MITRE ATT&CK to build a threat-informed defense.
-
CardinalOps Updates Techniques in MITRE ATT&CK v13 Describing New Adversary Methods for Hijacking Corporate Email Systems
The CardinalOps security research team collaborates with MITRE to strengthen ATT&CK, describing new ways in which adversary groups like LAPSUS$ hijack corporate email systems such as Office 365, Microsoft Exchange, and Google Workspace.
-
CardinalOps Updates MITRE ATT&CK v13 to Detect Email Transport Abuse Techniques
CardinalOps contributes to the latest version of MITRE ATT&CK, providing recommended detections in the native query languages for Splunk, Microsoft Sentinel, IBM QRadar and Sumo Logic, to combat cyber adversaries abusing email rules during attacks.
-
Energy Industry Faces Increasing Dark Web Cyber Threats
Ransomware threat actors target energy companies due to significant profits and a high number of remote access connections that can be exploited via weak or stolen credentials or VPN vulnerabilities.
-
CardinalOps Contributes Updates to MITRE ATT&CK Techniques Related to Abuse of Mail Transport Rules
Adversaries are hijacking corporate email systems such as Office 365 by abusing email transport rules. Learn how these sophisticated attacks work, plus how to detect them in Splunk, Microsoft Sentinel, IBM QRadar & Sumo Logic.
-
Splunk .conf23
CardinalOps will be exhibiting at Splunk .conf23 in Vegas from July 17-20th. Come visit our booth and grab a demo of our Detection Posture Management Platform!
-
Gartner Security & Risk Management Summit 2023
Join the CardinalOps team at Gartner Security & Risk Management Summit 2023 in National Harbor, Maryland from June 5-7th.