Mallory Enters AI Arms Race with Platform Promising Answers, Not Alerts
- AI-native platform launch: Mallory introduces a threat intelligence platform designed to transform security alerts into actionable answers.
- Alert fatigue solution: The platform contextualizes global threat data against an organization's specific assets and controls to prioritize genuine risks.
- Veteran leadership: Founded by Jonathan Cran, a former Google and Mandiant executive, with backing from Decibel Partners and Live Oak Venture Partners.
Experts in cybersecurity are likely to view Mallory's AI-native platform as a significant advancement in addressing alert fatigue and enabling proactive threat defense, particularly in an era where adversaries are increasingly leveraging AI for sophisticated attacks.
Mallory Enters AI Arms Race with Platform Promising Answers, Not Alerts
AUSTIN, Texas – April 09, 2026 – As cyber attackers increasingly weaponize artificial intelligence, a new startup led by a former Google and Mandiant executive is launching a platform designed to fight fire with fire. Mallory emerged from stealth today, unveiling an AI-native threat intelligence platform that promises to transform the daily deluge of security alerts into prioritized, actionable answers.
Founded by veteran security practitioners, the Austin-based company aims to solve one of the most persistent problems in cybersecurity: alert fatigue. The platform, available immediately, monitors thousands of global threat sources, but its core function is to contextualize that data against an organization's specific assets and controls. The goal is to move security teams away from a reactive posture of chasing endless notifications and toward a proactive model of addressing genuine, exploitable risks.
“Attackers are AI-enabled now, moving faster and with more capability. Defenders need to be too,” said Mallory founder and CEO Jonathan Cran in a statement. “Security teams don’t need more alerts. They need answers: what can attackers do, are our controls stopping them, and what’s exploitable right now.”
Beyond the Deluge of Alerts
The modern Security Operations Center (SOC) is drowning in data. A constant stream of signals from firewalls, endpoint detectors, and vulnerability scanners creates a cacophony that makes it difficult for human analysts to identify the true threats. This environment has led to widespread burnout among cybersecurity professionals and created a dangerous gap where critical events can be missed.
Mallory's central thesis is that the industry's problem is no longer a lack of data, but a failure of context and reasoning. While competitors like Mandiant and CrowdStrike have also integrated powerful AI into their offerings, Mallory is positioning itself as an “AI-native” solution built from the ground up to function as a “Cybersecurity Reasoning System.”
Instead of providing another feed or dashboard filled with vulnerability scores, the platform is designed to deliver a concise list of evidence-based cases. It continuously reasons across a company’s unique assets, its current security posture, and the global threat landscape to determine what actually matters. The system prioritizes risks not by generic CVSS scores, but by tracking which threat actors are actively exploiting which vulnerabilities, against which industries, and with what specific tactics. This allows it to answer the questions CISOs are constantly asking: “Are we vulnerable to this new exploit?” and “What should my team fix first?”
An AI-Native Approach in a New Arms Race
The launch comes at a critical juncture for the cybersecurity industry. The year 2026 has been marked by an escalating “AI arms race.” Adversaries are leveraging AI for everything from crafting hyper-realistic phishing emails to discovering and developing novel exploits at machine speed. Traditional defense mechanisms, built for a world of human-speed attacks, are proving insufficient.
This is where Mallory’s concept of “agentic speed” comes into play. The platform is engineered to connect real-time threat activity to an organization’s environment and process it for relevance at a pace that is impossible for human teams to match. This high-speed, automated analysis is crucial for preemptive defense, allowing teams to identify and neutralize potential threats before they can be exploited.
The company’s technology integrates with a client’s existing security stack, pulling in data to understand the specific environment. When a new vulnerability like a zero-day exploit emerges, Mallory’s system doesn't just flag it. It assesses whether the vulnerability is present, if it's actually exploitable given the existing controls, and whether any known threat actors are actively using it in the wild. The result is a highly contextualized and prioritized recommendation, moving teams from awareness to action much faster.
Veteran Leadership and Strategic Backing
Mallory’s ambitious vision is backed by deep industry expertise and significant financial investment. CEO Jonathan Cran brings a formidable resume, having held senior leadership roles where he built security products and services at both Google and Mandiant—two titans of the cybersecurity and technology worlds. This background provides the startup with invaluable insight into the operational realities of sophisticated security teams and the challenges of building technology at scale.
The company also announced a seed investment round led by Decibel Partners, with participation from Live Oak Venture Partners. “Threat intelligence was built for an era where we would be able to process information at human speed,” noted Dan Nguyen-Huu, a partner at Decibel. “With the introduction of agents on the adversarial side, we no longer have a data intel problem but rather a context and reasoning problem. Jonathan and the Mallory team are changing that.”
Further validating its approach, Mallory has also attracted investment from a notable group of individual industry leaders from organizations including Google, Robinhood, Cisco, Fastly, and GreyNoise. This diverse backing from experts across cloud infrastructure, finance, and specialized security underscores the perceived market need for Mallory's solution.
From Dashboards to Actionable Cases
For end-users, the platform's value is measured in clarity and speed. John Sapp, CISO of Texas Mutual Insurance, highlighted this critical need. “When a new alert makes the news, I need to know within minutes if we are impacted,” Sapp stated. “Mallory delivers the context needed to investigate at AI speed.”
This sentiment is echoed in early testimonials that emphasize a shift away from data management and toward strategic action. The platform is designed for flexibility, offering native support for integration via its API, Claude Code skills, and its own user interface, allowing teams to automate and extend its capabilities on their own terms.
By focusing on delivering a small number of high-confidence cases instead of tens of thousands of alerts, Mallory aims to restore focus and efficacy to beleaguered security teams. The platform is available immediately as a SaaS solution, and the company is offering a 30-day free trial, signaling confidence that hands-on experience will prove its value. As organizations across all sectors seek to defend against increasingly intelligent and automated threats, the industry will be watching closely to see if this new approach can truly deliver on the promise of answers, not just more alerts.
📝 This article is still being updated
Are you a relevant expert who could contribute your opinion or insights to this article? We'd love to hear from you. We will give you full credit for your contribution.
Contribute Your Expertise →