Resources Blog

Why Detection for Log4j Vulnerabilities is Both Important and Difficult

Topics: Featured

Posted by Kobi Haimovich and Yair Manor on January 17, 2022

In the last few weeks we've heard a lot about the Log4j vulnerabilities, with the most prominent being log4shell, and unfortunately, this is just the beginning. The situation is very serious, as the r... Read More>>

Cloud Security Engineering - Automation to the Rescue!

Topics: Featured, Threat Management, Security Engineering, SecOps, Cloud

Posted by Michael Mumcuoglu on August 28, 2021

Enterprises of all types and sizes are shifting to the cloud. Cloud related services, IaaS, PaaS, and SaaS are presenting new digital IT business opportunities with both short term and long term benef... Read More>>

SC Magazine Covers CardinalOps Threat Coverage Gap: SIEM Rules Ignore Bulk of MITRE ATT&CK

Topics: Featured, MITRE ATT&CK

Posted by Jason Matlof on February 25, 2021

SC Magazine Coverage of CardinalOps: SIEM Rules Ignore Bulk of MITRE ATT&CK Read More>>

The Comforting (or Discomforting?) Feeling of Objective Data Validation

Topics: Featured, Threat Management, Security Engineering, MITRE ATT&CK, SecOps

Posted by Yair Manor on February 10, 2021

It’s always nice to have conviction in your assumptions and hypotheses, but in the world we currently occupy there is a huge premium on truth, data and facts. I am, therefore, happy to announce the re... Read More>>