According to a recent LinkedIn post from Tidal Cyber, the company is drawing attention to the gap between high-level threat models such as MITRE ATT&CK and the detailed procedures adversaries actually use in real environments. The post highlights that while techniques like “lateral movement” and “credential dumping” help categorize behavior, they may not directly translate into specific defensive actions.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The company’s LinkedIn post emphasizes the concept of “procedural precision,” describing procedures as concrete sequences of steps, tools, and actions that attackers employ. It suggests that embedding these procedural details into a threat-led defense approach can help security teams better understand how attacks unfold and where they can be disrupted.
For investors, this focus points to Tidal Cyber’s positioning around more operational, actionable threat intelligence rather than purely conceptual frameworks. If the company’s platform or services successfully operationalize procedure-level insights at scale, it could enhance perceived value for enterprise security teams seeking measurable risk reduction.
The post also references a new blog discussing how procedures can serve as the foundation of threat-led defense, hinting at ongoing content and thought leadership initiatives. Sustained emphasis on this theme may help Tidal Cyber differentiate in a crowded cyber-threat intelligence and security operations market, potentially supporting customer acquisition and retention over time.

