-
Case Study: How a global firm expanded its ATT&CK coverage by 2x in less than 5 months
Learn how this SecOps team remediated missing, broken, and noisy detections in their SIEM and eliminated manual tasks.
-
ESG Report on SOC Modernization
See why 52% of security pros say SecOps are more difficult today than two years ago — and why they’re looking for easier ways to develop better detections in the SOC.
-
CardinalOps Solution Brief: Operationalize MITRE ATT&CK in Your SOC
View the platform architecture and how it uses automation and ATT&CK to implement a threat-informed defense for your existing SIEM/XDR.
-
Security Layers — Measuring MITRE ATT&CK Detection Coverage Across Your Entire Attack Surface, Linked to Business Outcomes
If you’re like most of us in the defender community, you’re probably tired of seeing all the colored heat maps used to represent MITRE ATT&CK detection coverage.
-
CardinalOps Extends MITRE ATT&CK-based Detection Posture Management with Security Layers
Enables detection-in-depth by enumerating how many layers in your attack surface (endpoint, network, cloud, email, IAM, etc.) are covered for a given technique.
-
CardinalOps Launches MITRE ATT&CK Security Layers for Measuring Detection Posture Linked to Desired Business Outcomes
Enables enterprises to operationalize ATT&CK and build a multi-layered, threat-informed defense to eliminate gaps based on organizational risk and priorities.
-
How Detection Posture Management Helps CISOs Track the Right Metrics
New coverage metrics help justify security budgets to leadership and drive continuous improvement in security operations
-
CardinalOps Named Winner in 2023 Globee® Cybersecurity Awards
Other winners include Palo Alto Networks, Imperva, Dragos, AttackIQ, and Cymulate.
-
CardinalOps Honored as Winner in 2023 Cybersecurity Excellence Awards
Recognized for innovative Detection Posture Management platform leveraging automation and MITRE ATT&CK to eliminate coverage gaps in the SOC.
-
Adaptable ‘Swiss Army Knife’ Malware a Growing Threat
Multipurpose malware is more effective because it can execute multiple stages of the MITRE ATT&CK kill chain.
-
Russia Engages With Ukraine on Cyber Battlefield
Wiper malware has been used against Ukraine since 2015 by adversary groups like Sandworm. An updated version was used as Russia invaded in February 2022.
-
CISA Calls For Increased Vigilance One Year After Ukraine’s Russian Invasion
Gaining more detections at all security layers — endpoint, network, email, IAM, cloud, etc.— and moving to the cloud are the key lessons from the past year.