Skip to content

Small but Mighty: UX Design Tips for a Lean Team Environment

As a senior UX designer at Tidal Cyber, I often field questions from other designers and cybersecurity industry...

Taming the Machine: Putting Security at the Core of Generative AI

AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to...

Webinar Takeaways: Strengthen Your Defenses with Ransomware Threat Prioritization

I’ve been speaking a lot lately about one of my favorite topics: the need for threat prioritization. The threat...

All Exposures Aren’t Equal: The More Effective Path to CTEM

CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to...

Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber

ATT&CK v17 We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17...

Knowing Your Defenses Beyond a Vulnerability Focused Approach to CTEM

The chaotic world of cybersecurity where the threats from nation-states, cyber gangs, botnet operators, and APT groups...