Skip to content

Turning Up the Heat on ATT&CK Heatmaps to Address Residual Risk

Stepping into a time machine and traveling back to the past, during the last half of my nearly 20 year career at MITRE...

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry...

Taming the Machine: Putting Security at the Core of Generative AI

AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to...

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat...

All Exposures Aren’t Equal: The More Effective Path to CTEM

CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to...