Skip to content
LEARN MORE

Resources & Downloads

Read original and joint research that demonstrates how Tidal Cyber empowers organizations with Threat-Informed Defense and also helps the community at large.

Ultimate Guide To Cyber Threat Profiling Linkedin

Featured Content

The Ultimate Guide to Cyber Threat Profiling

Our comprehensive guide equips defenders with a structured process to identify and prioritize threats relevant to their organization, helping them focus on the ones most critical to them.

Threat Informed Defense and Tidal Cyber Cover

Threat-Informed Defense & Tidal Cyber

A New Way to Operationalize Enterprise Cybersecurity and Improve Defenses

For the past several decades, most cybersecurity efforts have focused on identifying and closing vulnerabilities – flaws in the software we depend on that adversaries exploit to attack us, but this isn't sufficient. We need Threat-Informed Defense. 

Cyentia IRIS Cover

Information Risk Insights Study: RANSOMWARE

Tidal Cyber provided critical intelligence to support this Cyentia report sponsored by CISA on the current state and future considerations for mitigating ransomware.

mitre attack report cover

Multi Source Analysis of Top MITRE ATT&CK Techniques

Cyentia and Tidal Cyber tackle a fundamental question in cybersecurity: How do adversaries attack, and which defenses should we prioritize? 

Election Cyber Interference Cover

Election Cyber Interference Threats & Defenses: A Data-Driven Study

Look at threats to global elections in 2024 and how to prioritize defenses against top adversaries & election interference TTPs.

Defensive measures against Ransomware Cover

Defensive Measures Against Ransomware

Implementing basic cyber hygiene leads to a significant improvement in the ability of small businesses to fend off ransomware, according to this analysis by Tidal Cyber and the Global Cyber Alliance (GCA).

Three ways quantifying cyber confidence can improve your defensive posture cover

Three Ways Quantifying Cyber Confidence Can Improve Your Defensive Posture

Are you measuring your actual security, or just your effort towards security? Quantifying your cyber risk can help. This whitepaper explains more.

Threat Informed Defense Cover

Threat-Informed Defense at Enterprise Scale

This infographic shows how Tidal considers both adversary techniques and defensive stacks to generate coverage maps.