Security Today Announces 2023 CyberSecured Award Winners
CardinalOps’ Detection Posture Management platform was selected as a 2023 CyberSecured award winner in the Automated Security Controls Assessments (ASCA) category.
CardinalOps’ Detection Posture Management platform was selected as a 2023 CyberSecured award winner in the Automated Security Controls Assessments (ASCA) category.
CardinalOps CEO Michael Mumcuoglu weighs in on the new SEC mandates effective December 15th, requiring organizations to describe their processes for “assessing, identifying and managing material risks from cybersecurity threats.”
In this paper, SANS Director of Emerging Security Trends, John Pescatore, compiles data from the recent SANS survey of 267 cybersecurity professionals to determine the state of practice in detection engineering.
CardinalOps, the detection posture management company, announced today that it contributed updates to the latest version of MITRE ATT&CK, a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
Repsol aims for net-zero emissions by 2050 but faces growing cybersecurity challenges. Read this executive summary to learn how they use automation, threat intelligence and CardinalOps for enhanced security.
This roundup of reports reveals some of the scariest cybersecurity stats from CardinalOps’s State of SIEM 2023 Report and other cybersecurity researchers in 2023.
Michael Mumcuoglu, CEO and co-founder at CardinalOps, said the main focus during this “difficult and heartbreaking time” has been on supporting the company’s Israeli team and their families.
“CardinalOps delivers the breadth of security coverage that we need to fix our detection gaps, resulting in a more secure environment and efficient security operations,” said Javier García Quintela, Global CISO of Repsol.
Join us on September 28 at 11:00 am EDT to learn from Javier García Quintela, Repsol’s Global CISO, as he shares strategies to mitigate risks of ransomware, breaches, and insider threats using automation and analytics.
“It’s not surprising that nation-state attackers were able to break into the network of a Russian design bureau so they could exfiltrate sensitive information,” said Phil Neray, vice president of Cyber Defense Strategy at CardinalOps.
Phil Neray of CardinalOps suggests that “organizations should protect themselves by implementing granular monitoring with detections that cover all of these adversary techniques and look for unusual or unauthorized access to backups.”
A skilled, high-profile Cuban ransomware group employed “29 different MITRE ATT&CK techniques as they navigated the kill chain from initial access to defense evasion and lateral movement,” according to Phil Neray of CardinalOps.