CardinalOps
  • Platform
  • Use Cases

    Use Cases

    • Map all your detections to MITRE ATT&CK
    • Gain new detections to address critical gaps
    • Identify and fix broken detection rules
    • Pinpoint root causes of noisy rules
    • Continuous Threat Exposure Management (CTEM)
    • Operationalize threat intelligence
    • Measure the depth of ATT&CK coverage
    • Assess and improve your detection posture
    • Report on detection posture to leadership and auditors
    • Manage detection posture across multiple SIEMs
  • Integrations
  • Company

    Company

    • Who we are

      Meet the leadership team, advisors, investors, and mission that drive us forward.

    • Why work here

      Big challenges need big thinkers. Are you up to it?

    • Careers

      Your opportunity to make a difference … for our customers, the world, and yourself.

    • Security & Compliance

      We value the privacy and security of your data.

  • Resources

    Resources

    • Blog
    • Newsroom
    • Webinars & Events
    • White Papers
    • Videos
  • Contact Us
  • Book a Demo
HOME
  • Blog
  • Newsroom
  • Webinars & Events
  • White Papers
  • Videos
  • SIEMs not detecting a huge percentage of MITRE ATT&CK techniques

    SIEMs not detecting a huge percentage of MITRE ATT&CK techniques

    CardinalOps 2022 SIEM Detection Risk report shows SIEMs missing detections for 80% of MITRE ATT&CK techniques; 15% of SIEM rules are broken and will never fire.

  • Colonial Pipeline Ransomware Attack: Lessons for Technologists

    Colonial Pipeline Ransomware Attack: Lessons for Technologists

    Eliminate monitoring blind spots in your SIEM using MITRE ATT&CK.

  • Enterprise SIEMs Fall Short on Detecting Attacks

    Enterprise SIEMs Fall Short on Detecting Attacks

    75% of organizations that forward identity logs such as Active Directory and Okta to their SIEM, do not use them.

  • Enterprise SIEMs are Missing Detections for 4 out of 5 of All MITRE ATT&CK Techniques

    Enterprise SIEMs are Missing Detections for 4 out of 5 of All MITRE ATT&CK Techniques

    Second annual report analyzed production SIEM instances to understand SOC preparedness to detect latest adversary techniques in MITRE ATT&CK.

  • Data Shows Enterprise SIEMs Detect Fewer Than 5 of the Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild

    Data Shows Enterprise SIEMs Detect Fewer Than 5 of the Top 14 MITRE ATT&CK Adversary Techniques Used in the Wild

    Actual coverage remains far below what most organizations expect; organizations unaware of gap between their assumed security and defenses actually in place.

  • SolarWinds Data Breach Lawsuit Takeaways for CISOs

    SolarWinds Data Breach Lawsuit Takeaways for CISOs

    What the lawsuit about the SolarWinds attack teaches us about minimum standards of due care.

  • CISA, Int’l Cybersecurity Bodies Issue Advisory to MSPs

    CISA, Int’l Cybersecurity Bodies Issue Advisory to MSPs

    Why going after MSPs is an increasingly common type of supply chain attack

  • Better Cybercrime Metrics Act Signed Into Law

    Better Cybercrime Metrics Act Signed Into Law

    How standard frameworks like VERIS and MITRE ATT&CK enable a standard language and taxonomy about cyberattacks

  • FBI Director Warns of Chinese Espionage Threats

    FBI Director Warns of Chinese Espionage Threats

    Use MITRE ATT&CK to ensure you have detections for the latest adversary techniques employed by APT groups like Deep Panda.

  • Devo Technology and the Autonomous SOC

    Devo Technology and the Autonomous SOC

    Automation is critical for addressing constant change in threat landscape — plus exponential increase in volume of data collected to spot suspicious activities.

  • What It Takes to Become an Information Security Analyst

    What It Takes to Become an Information Security Analyst

    A natural curiosity for how things work, such as what the database logs tell you or what does a specific cloud permission let you do.

  • Patch, Remediation Advice Emerges for Spring4Shell Vulnerability

    Patch, Remediation Advice Emerges for Spring4Shell Vulnerability

    Monitor suspicious processes spawned by Java. Avoid false positives by investigating logs at least 90 days back and whitelisting known child-process.

Previous Page
1 … 15 16 17 18 19 … 21
Next Page

Control your exposure

CardinalOps’ Threat Exposure Management platform optimizes your prevention and detection controls across endpoint, cloud, identity, network and more, so you can proactively mitigate risk for your organization.

Gain complete visibility into your security stack and map threat actor techniques against the configuration of your security tools. Identify risky exposures, quickly prioritize with context, and close gaps to optimize the overall effectiveness of your cyber defense.

See CardinalOps in action!

Book a Demo
CardinalOps

Optimize your cyber defense with AI-powered threat exposure management.

  • Use Cases
  • Integrations
  • Company
  • Resources

© 2025 CardinalOps

Privacy Policy | Terms & Conditions | Security & Compliance