A LinkedIn post from Tidal Cyber highlights a critique of traditional cybersecurity risk management that focuses primarily on asset inventories and vulnerability severity. The post instead emphasizes that risk materializes when adversaries execute specific procedures, and it references a Dark Reading article by Tidal executive Frank Duff to elaborate this perspective.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The post suggests that a threat-led defense approach, organized around adversary procedures, can help security teams better prioritize which assets and vulnerabilities matter most in real-world attacks. For investors, this framing points to Tidal Cyber’s strategic positioning around procedure-centric threat intelligence and decision support, which may differentiate its offerings in a crowded cybersecurity market.
By advocating a methodology that begins with adversary behavior and then maps to assets, vulnerabilities, and defensive controls, Tidal Cyber appears to be aligning its value proposition with outcome-focused risk reduction. If enterprises adopt this approach at scale, the company could benefit from increased demand for tools that operationalize procedure-based analysis and support more targeted cyber defense investments.
The emphasis on answering practical questions—such as which assets must be defended, which vulnerabilities materially increase attacker success, and where defenses must perform—suggests a focus on measurable security outcomes. This could resonate with budget holders seeking to justify cybersecurity spend and may support longer-term revenue opportunities for Tidal Cyber as organizations seek to modernize their risk-management frameworks.

