CardinalOps
  • Platform
  • Use Cases

    Use Cases

    • Map all your detections to MITRE ATT&CK
    • Gain new detections to address critical gaps
    • Identify and fix broken detection rules
    • Pinpoint root causes of noisy rules
    • Continuous Threat Exposure Management (CTEM)
    • Operationalize threat intelligence
    • Measure the depth of ATT&CK coverage
    • Assess and improve your detection posture
    • Report on detection posture to leadership and auditors
    • Manage detection posture across multiple SIEMs
  • Integrations
  • Company

    Company

    • Who we are

      Meet the leadership team, advisors, investors, and mission that drive us forward.

    • Why work here

      Big challenges need big thinkers. Are you up to it?

    • Careers

      Your opportunity to make a difference … for our customers, the world, and yourself.

    • Security & Compliance

      We value the privacy and security of your data.

  • Resources

    Resources

    • Blog
    • Newsroom
    • Webinars & Events
    • White Papers
    • Videos
  • Contact Us
  • Book a Demo
HOME
  • Blog
  • Newsroom
  • Webinars & Events
  • White Papers
  • Videos
  • How do Russian threat groups avoid “friendly cyber fire”? (TL;DR – By installing a Russian language pack)

    How do Russian threat groups avoid “friendly cyber fire”? (TL;DR – By installing a Russian language pack)

    Welcome to cyber-physical conflict The current situation in Ukraine demonstrates once again how the lines have blurred between cyber and physical conflict. 

  • What Anton Chuvakin is Saying About SOC Threat Coverage

    What Anton Chuvakin is Saying About SOC Threat Coverage

    Anton Chuvakin, SIEM expert and former Gartner analyst (now at Google Chronicle) has written a thought-provoking blog post titled “SOC Threat Coverage Analysis — Why/How?“.

  • Why Detection for Log4j Vulnerabilities is Both Important and Difficult

    Why Detection for Log4j Vulnerabilities is Both Important and Difficult

    In the last few weeks we’ve heard a lot about the Log4j vulnerabilities, with the most prominent being log4shell, and unfortunately, this is just the beginning. The situation is very serious, as the recommendations from

  • Broken Glam: How healthy is your SIEM?

    Broken Glam: How healthy is your SIEM?

    Threats are constant. Organizations are trying to always stay ahead of new methods of attack, APT groups, and other known vulnerabilities. A key component of any SOC is a well-functioning SIEM. However, the SIEM is

  • The Problem You Didn’t Know You Had – The Threat Coverage Gap

    The Problem You Didn’t Know You Had – The Threat Coverage Gap

    At CardinalOps, we talk to many, many security professionals about their security engineering practices, and their Security Information and Event Management (SIEM) solutions. The typical challenges we hear are:

  • Cloud Security Engineering – Automation to the Rescue!

    Cloud Security Engineering – Automation to the Rescue!

    Enterprises of all types and sizes are shifting to the cloud. Cloud related services, IaaS, PaaS, and SaaS are presenting new digital IT business opportunities with both short term and long term benefits. In fact,

  • SC Magazine Covers CardinalOps Threat Coverage Gap: SIEM Rules Ignore Bulk of MITRE ATT&CK

    SC Magazine Covers CardinalOps Threat Coverage Gap: SIEM Rules Ignore Bulk of MITRE ATT&CK

    SC Magazine Coverage of CardinalOps: SIEM Rules Ignore Bulk of MITRE ATT&CK

  • The Comforting (or Discomforting?) Feeling of Objective Data Validation

    The Comforting (or Discomforting?) Feeling of Objective Data Validation

    It’s always nice to have conviction in your assumptions and hypotheses, but in the world we currently occupy there is a huge premium on truth, data and facts. I am, therefore, happy to announce the

  • “Hello World!” – the CardinalOps Coming Out Party!

    “Hello World!” – the CardinalOps Coming Out Party!

    We are thrilled to finally be able to share the story of what we’ve been working on for nearly a year. The story of how CardinalOps was founded.

  • CardinalOps Introduces Industry’s First Threat Coverage Optimization Platform

    CardinalOps Introduces Industry’s First Threat Coverage Optimization Platform

    [January 20, 2020, 8:00am Pacific Standard Time, USA]

  • Security Engineering: The Next Application for AI-Powered Automation

    Security Engineering: The Next Application for AI-Powered Automation

    We’re excited to announce our investment in cybersecurity startup CardinalOps, led by successful serial entrepreneurs Michael Mumcuoglu and Yair Manor. With this new company, they are applying AI-based analytics and automation to a relatively unaddressed

  • Applying AI and Automation to a Surprisingly Unaddressed Security Function

    Applying AI and Automation to a Surprisingly Unaddressed Security Function

    In the cybersecurity market, we’ve seen fairly dramatic innovation over the past decade related to AI-based technologies–with much of that technology applied towards threat-detection techniques. Literally hundreds of startups have been funded in areas including

Previous Page
1 … 18 19 20 21
Next Page

Control your exposure

CardinalOps’ Threat Exposure Management platform optimizes your prevention and detection controls across endpoint, cloud, identity, network and more, so you can proactively mitigate risk for your organization.

Gain complete visibility into your security stack and map threat actor techniques against the configuration of your security tools. Identify risky exposures, quickly prioritize with context, and close gaps to optimize the overall effectiveness of your cyber defense.

See CardinalOps in action!

Book a Demo
CardinalOps

Optimize your cyber defense with AI-powered threat exposure management.

  • Use Cases
  • Integrations
  • Company
  • Resources

© 2025 CardinalOps

Privacy Policy | Terms & Conditions | Security & Compliance