The 20/80 Rule in Tool Utilization

In my decade-long tenure as a CISO within the Defense Industrial Base (DIB),...

Read More

Purple Teaming for Operational Technology (OT)

This joke highlights key differences between Information Technology (IT) and...

Read More

Why Cyber Risks Persist for Companies, Even with In-House Teams or MSSP Support

As cyber threats become more sophisticated, organizations are increasingly...

Read More

Rethinking Cyber Security Budgeting

Imagine cybersecurity managers as the architects and builders of a fire...

Read More

Quantifying Business Risk Reduction and ROI

Justifying Threat Emulation By The Numbers Today, businesses face the daunting...

Read More

Storm Chasing: Defend Against Volt Typhoon with SCYTHE

Understanding and predicting an adversary's moves is critical to defense...

Read More

TSA SD-02C: Critical Infrastructure Cyber Regulations

In response to escalating cybersecurity threats targeting the United State's...

Read More

SCYTHE: Connecting the Red and Blue Transforming Controls Validation with Smart Tagging

Traditional Breach and Attack Simulation (BAS) tools have provided...

Read More

Transforming Proactive Cybersecurity with SCYTHE's AI Assistant: Cl0ppy

In the ever-evolving security market, organizations find themselves in a tough...

Read More