Skip to content

Iran Cyber Threat Assessment and Defensive Guidance

As hostilities between Israel and Iran resumed earlier this month, sources warned of cyber activity stemming from the...

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry...

Taming the Machine: Putting Security at the Core of Generative AI

AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to...

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat...

All Exposures Aren’t Equal: The More Effective Path to CTEM

CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to...