Malware Risks in Open Source Code

Snippet: Malware in open-source code can create security vulnerabilities,...

Read More

CISO Stressed Episode 9: Aldan Berrie

On this episode of CISO STRESSED, Liz Wharton SCYTHE Chief of Staff is...

Read More

The Real Costs of Ransomware: Hidden Costs

As threat actors continue to target organizations, the direct costs of a...

Read More

Threat Intelligence Sharing: Democratizing Risk Information

As July 2021 closes, the Executive Order on Improving the Nation’s...

Read More

CISO Stressed Episode 8: Robert “RSnake” Hansen

On this episode of CISO STRESSED, SCYTHE Chief of Staff and Host...

Read More

Adaptive Adversary Emulation (Part 1): Execution Details

TLDR: SCYTHE’s Adversary Emulation Lead Tim Schulz revisits his SANS...

Read More

Malicious Uses of Blockchains

Malicious Uses of Blockchains This blog post will briefly explain what...

Read More

You can’t detect 0-day exploits but… you can detect what happens next

TLDR: One of the best-known ways to gain access into an organization and...

Read More

Gravwell Integration with SCYTHE

Gravwell Integration with SCYTHE Enterprise-grade platforms have to...

Read More