-
Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks
Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.
-
[Upcoming] The Future of Risk-Based Detection
Join us on June 20 at 3:30 pm EDT for this SANS webinar. SecOps experts discuss major challenges for the modern Security Operations Center and how to operationalize MITRE ATT&CK to build a threat-informed defense.
-
CardinalOps Contributes Updates to MITRE ATT&CK Techniques Related to Abuse of Mail Transport Rules
Adversaries are hijacking corporate email systems such as Office 365 by abusing email transport rules. Learn how these sophisticated attacks work, plus how to detect them in Splunk, Microsoft Sentinel, IBM QRadar & Sumo Logic.
-
Learn how to identify and fix a rule you don’t know is broken
Based on analyzing thousands of detections, our research team has compiled the top 10 ways that SIEM rules break (silently) over time.
-
Noisy rules give adversaries an easy path to exploit weaknesses in your defenses
This research summary lists the top causes of noisy rules in your SIEM, followed by 5 best practices to help minimize noise.
-
Eliminate coverage gaps with automation and MITRE ATT&CK
Watch this 3-minute video to learn how CardinalOps continuously ensures you have the detections that matter most.