CardinalOps
  • Platform
  • Use Cases

    Use Cases

    • Map all your detections to MITRE ATT&CK
    • Gain new detections to address critical gaps
    • Identify and fix broken detection rules
    • Pinpoint root causes of noisy rules
    • Continuous Threat Exposure Management (CTEM)
    • Operationalize threat intelligence
    • Measure the depth of ATT&CK coverage
    • Assess and improve your detection posture
    • Report on detection posture to leadership and auditors
    • Manage detection posture across multiple SIEMs
  • Integrations
  • Company

    Company

    • Who we are

      Meet the leadership team, advisors, investors, and mission that drive us forward.

    • Why work here

      Big challenges need big thinkers. Are you up to it?

    • Careers

      Your opportunity to make a difference … for our customers, the world, and yourself.

    • Security & Compliance

      We value the privacy and security of your data.

  • Resources

    Resources

    • Blog
    • Newsroom
    • Webinars & Events
    • White Papers
    • Videos
  • Contact Us
  • Book a Demo
HOME
  • Blog
  • Newsroom
  • Webinars & Events
  • White Papers
  • Videos
  • Safeguarding Azure Blobs: Detecting Public Network Access Configurations

    Safeguarding Azure Blobs: Detecting Public Network Access Configurations

    Microsoft Azure utilizes blobs to house large amounts of unstructured data. An Azure blob can be configured to be accessed from specific IP addresses only. This is the common configuration and a known best practice

  • The Importance of Proactive Detection Engineering in Light of Ivanti’s VPN Vulnerabilities

    The Importance of Proactive Detection Engineering in Light of Ivanti’s VPN Vulnerabilities

    Ivanti’s recent disclosure of a new high-severity flaw in its Connect Secure VPN devices marks the fifth such vulnerability revealed over the past couple of months. This alarming trend sheds light on a broader issue

  • SIEM Migration: Challenges and Strategies

    SIEM Migration: Challenges and Strategies

    In this exploration, we delve into the intricacies of SIEM migration, focusing on critical aspects like the SIEM style, data acquisition, correlation methods, securing the SIEM, and the imperative task of migrating SIEM detection coverage.

  • Detection Gaps: The Silent Threat Weakening Your SOC

    Detection Gaps: The Silent Threat Weakening Your SOC

    Security teams are under constant pressure to do more with less. Budgets rarely keep pace with the explosion of threats, while the complexity of modern IT environments continues to grow. SOC leaders invest heavily in

  • Bash and Switch: Hijacking via Windows Subsystem for Linux

    Bash and Switch: Hijacking via Windows Subsystem for Linux

    Windows Subsystem for Linux (WSL) is a feature in Windows that allows users to run a real Linux user space directly inside Windows, without needing a virtual machine or dual-boot setup. This feature is commonly

  • Guide to Compensating Controls

    Guide to Compensating Controls

    Security teams face an overwhelming reality: too many exposures, too few resources, and limited time to patch everything. In practice, direct remediation is often delayed or even impossible—yet the risks remain. That’s where compensating controls

  • Closing Falcon EDR Gaps with Automated Delivery of New IOA Rules

    Closing Falcon EDR Gaps with Automated Delivery of New IOA Rules

    Managing a threat-informed detection posture across your full security stack is no small task–even for large, leading-edge enterprise security teams. That’s why we’re excited to help our customers unlock the full potential of their CrowdStrike

  • It’s Not a Bug, It’s Feature Abuse: A Deep Dive Into Azure Web App Logs and Attack Visibility

    It’s Not a Bug, It’s Feature Abuse: A Deep Dive Into Azure Web App Logs and Attack Visibility

    Azure makes it easy to spin up serverless functions and web apps, a convenience  that often comes with security blind spots. Logs are fragmented across services, authentication defaults may leave endpoints exposed, and preview environments

  • Complete Guide to Auditing Object Access Events

    Complete Guide to Auditing Object Access Events

    “Absence of evidence is not evidence of absence.” Evidence is the backbone of every investigation, both in regular crime and in cyber crime. The key for effective incident response when it comes (and nowadays, sooner

  • Living off WinRM: Abusing Complexity in Remote Management

    Living off WinRM: Abusing Complexity in Remote Management

    Key Context: What Is LOLBAS Anyway? LOLBAS (Living Off The Land Binaries, Scripts, and Libraries) are legitimate Windows tools and binaries that attackers abuse to perform malicious actions without using custom malware. One of the

  • Introducing Cardinal AI for Agentic Exposure Management

    Introducing Cardinal AI for Agentic Exposure Management

    How do you know if your security program is actively reducing exposure risk?   You’ve got a full security stack. Vulnerability findings pile up, but they ignore exposures like cloud misconfigurations and prevention control gaps. You

  • CardinalOps Solution Brief: Unified Exposure Management

    CardinalOps Solution Brief: Unified Exposure Management

    CardinalOps helps enterprise security teams proactively eliminate exposure risk by continuously validating threat coverage, pinpointing exposures that attackers can actually exploit, and enabling high-impact remediations. 

  • MCP Defaults Will Betray You: The Hidden Dangers of Remote Deployment

    MCP Defaults Will Betray You: The Hidden Dangers of Remote Deployment

    The Model Context Protocol (MCP) enables seamless integration between large language models (LLMs) and external tools. It powers agent-driven workflows in platforms like Claude Desktop and GitHub Copilot. Typically, developers use MCP servers to expose

  • CardinalOps Launches Cardinal AI for Agentic Exposure Management

    CardinalOps Launches Cardinal AI for Agentic Exposure Management

    Introducing Autonomous, Targeted Mitigations via Compensating Controls BOSTON and TEL AVIV, Israel, July 29, 2025 /PRNewswire/ — CardinalOps, the leading Unified Exposure Management platform, today announced the launch of Cardinal AI, a new suite of artificial intelligence capabilities designed to

  • 2025 State of Detection Workshop: The Pursuit of Immutable Artifacts

    2025 State of Detection Workshop: The Pursuit of Immutable Artifacts

    Download this detection engineering workshop with CardinalOps Security Researcher, Daniel Koifman, to reinforce the best practices recommended in our 2025 State of SIEM Detection Risk Report. In this recording, SOC leaders and practitioners will get

1 2 3 … 20
Next Page

Control your exposure

CardinalOps’ Threat Exposure Management platform optimizes your prevention and detection controls across endpoint, cloud, identity, network and more, so you can proactively mitigate risk for your organization.

Gain complete visibility into your security stack and map threat actor techniques against the configuration of your security tools. Identify risky exposures, quickly prioritize with context, and close gaps to optimize the overall effectiveness of your cyber defense.

See CardinalOps in action!

Book a Demo
CardinalOps

Optimize your cyber defense with AI-powered threat exposure management.

  • Use Cases
  • Integrations
  • Company
  • Resources

© 2025 CardinalOps

Privacy Policy | Terms & Conditions | Security & Compliance