Tidal Cyber Unveils Threat-Informed Defense Platform
CIOReview
CIOREVIEW >> Cyber Security >>

Tidal Cyber Unveils Threat-Informed Defense Platform

By CIOReview | Thursday, August 18, 2022

Security analysts can learn more advanced information on the actions of adversaries thanks to Community Edition, the first of several Tidal products.

FREMONT, CA: Security is a growing concern in society, and technology is more reliant on us than ever. This trend won't slow down if we don't address it. Social media accounts now post data leaks that could result in identity theft. Cloud storage services store sensitive information such as social security numbers, credit card numbers, and bank account details. Tidal Cyber, one of the pioneers in threat-informed defense, revealed that the Community Edition of their SaaS threat-informed protection technology is now generally available.

"Threat-informed cyber defense is based on understanding how adversaries are likely to attack your organization and using that knowledge to ensure you have the optimal security solutions in place. Our goal is to enable security teams to maintain a 'single source of truth' for all data regarding relevant threats and countermeasures. With the availability of Community Edition, organizations can now not only explore the extensive knowledge base of adversarial behaviors more efficiently, but also quickly research solutions available to defend against those threats." says Richard Struse, Chief Technology Officer and Co-Founder of Tidal Cyber.

Businesses may evaluate, organize, and optimize their cyber defenses using the Tidal Platform based on a thorough understanding of the threats and adversaries that are most pertinent to them. The free Tidal Community Edition gives security analysts the ability to more quickly and effectively adapt the in-depth understanding of adversary behaviors provided by the MITRE ATT&CK® knowledge base and other open-source threat intelligence sources to their particular context.

In addition, the platform enables analysts to turn this threat intelligence into actionable knowledge by demonstrating how particular security solutions address adversaries' actions to counter such attacks more effectively.