US cybersecurity experts discuss options in response to a staged cyber attack
US cybersecurity experts discuss options in response to a staged cyber attack. Photo: Maj. Christopher Vasquez/DVIDS

US startup Tidal Cyber has launched NARC (Natural Attack Reading and Comprehension), a new AI system that automatically extracts adversary behaviors from unstructured cybersecurity data.

NARC ingests cyber threat intelligence reports, incident response records, and findings from simulated attack exercises, converting them into structured adversary procedures.

By mapping not just tactics and techniques but the way attackers operate, the tool helps security teams shift from reactive responses to a threat-led defense posture.

The system maintains an updated intelligence base that can inform detection, response, hunting, and control-validation activities.

It builds relationships between threat groups, software, and campaigns, generating new threat objects linked to existing data for a continuously evolving picture of adversary operations.

According to the company, the tool slashes the time spent manual tagging and mapping threats, turning hours of analysis into minutes.

“NARC represents a fundamental shift in how defenders harness AI,” said Frank Duff, Co-Founder and Chief Innovation Officer at Tidal Cyber.

“We’re bridging the gap between intelligence and action. It’s no longer about collecting more data; it’s about understanding how adversaries operate and ensuring our defenses are aligned accordingly.”

From Procedures to Actionable Defense

NARC integrates with Tidal Cyber’s Threat-Led Defense platform, optimizing detection, incident response, and control validation across an organization.

The platform links threat intel to existing security controls to show which attack methods are detectable, blockable, or remain unprotected.

Rather than stopping at general attack techniques, it breaks threats down into the specific commands and processes used by adversaries.

Drawing from more than 1,500 technical reports, the system continuously updates detailed threat data, turning it into actionable data for defense operations.

It also operates in a continuous cycle: mapping intelligence to real attacker behaviors, measuring defensive gaps, validating which controls succeed, and optimizing configurations and priorities based on the findings.

You May Also Like

US Army Cyber Command Taps Peraton to Streamline Operations With AI

Peraton’s AI platform integrates into army cyber operations, enhancing training, penetration testing, and real-time guidance for faster, smarter mission outcomes.

New Virtualitics AI Tool Aims to Streamline Defense Readiness

Virtualitics’ Iris blends Generative AI with mission-tuned agents to turn complex readiness data into real-time, actionable insights for defense teams.