SCYTHE 5.1 Released  Read More

Rethinking Cyber Security Budgeting

Imagine cybersecurity managers as the architects and builders of a fire...

Read More

Quantifying Business Risk Reduction and ROI

Justifying Threat Emulation By The Numbers Today, businesses face the daunting...

Read More

TSA SD-02C: Critical Infrastructure Cyber Regulations

In response to escalating cybersecurity threats targeting the United State's...

Read More

Your Annual Pentest Is a Waste of Money — Here's What to Do Instead.

Opinion Purple Teaming Controls Validation Compliance & Frameworks You're...

Read More

Command-Line Obfuscation | SCYTHE

Read More

SCYTHE Announces Series A Funding Round

Today, the SCYTHE team and I are thrilled and proud to announce the closure...

Read More

You can’t detect 0-day exploits but you can detect what happens next!

TLDR: One of the best-known ways to gain access into an organization and...

Read More

Attack, Detect, and Respond a UniChat with Ed Amoroso and Bryson Bort

This UniChat was something special. SCYTHE Founder and CEO, Bryson Bort sat...

Read More

Florida Water Plant Breach

TeamViewer was at the forefront of an attack on a Florida water facility in...

Read More