Tidal Cyber Shifts Threat Defense Focus to Procedure Modeling
Event summary
- Tidal Cyber is redefining its Threat-Led Defense model to focus on adversary procedures, the step-by-step actions attackers take.
- The company claims existing security models focused on techniques are insufficient to prevent breaches.
- Tidal Cyber's Procedures Library currently contains over 20,000 objects and is expanding.
- The company expanded its NARC AI engine to translate unstructured threat intelligence into structured procedures.
- Tidal Cyber is positioning adversary execution as the primary unit of measurement in Threat-Led Defense.
The big picture
For years, cybersecurity has struggled to keep pace with increasingly sophisticated attacks despite investments in visibility and exposure scoring. Tidal Cyber's shift to procedure-based defense represents a fundamental challenge to the prevailing paradigm, arguing that simply identifying vulnerabilities and techniques is insufficient. This move could signal a broader re-evaluation of how organizations approach threat mitigation, potentially disrupting the established vendor landscape and forcing a more granular focus on attack execution.
What we're watching
- Market Adoption
- Whether Tidal Cyber's procedural approach gains traction within the cybersecurity industry, or if existing technique-based frameworks remain dominant, will determine the long-term success of this shift.
- AI Integration
- The effectiveness of Tidal Cyber's NARC AI engine in consistently translating unstructured threat intelligence into actionable procedures will be critical for demonstrating the value of the new model.
- Competitive Response
- Other cybersecurity vendors will likely respond to Tidal Cyber’s move, potentially leading to a broader industry shift towards procedure-based defense or a reinforcement of existing techniques-focused approaches.
Related topics
