Posts about

cybersecurity

Quantifying Business Risk Reduction and ROI

Justifying Threat Emulation By The Numbers Today, businesses face the daunting...

Read More

Storm Chasing: Defend Against Volt Typhoon with SCYTHE

Understanding and predicting an adversary's moves is critical to defense...

Read More

SCYTHE: Connecting the Red and Blue Transforming Controls Validation with Smart Tagging

Traditional Breach and Attack Simulation (BAS) tools have provided...

Read More

Transforming Proactive Cybersecurity with SCYTHE's AI Assistant: Cl0ppy

In the ever-evolving security market, organizations find themselves in a tough...

Read More

SCYTHE: 2024 Cyber Impact Makers

Cyber threats in 2024 are escalating in frequency and sophistication,...

Read More

Critical Infrastructure Cybersecurity Compliance

Today, the availability and security of critical infrastructure are of utmost...

Read More

Risk Assessment Maturity Model: Advancing Approach with Maturity

Ego does not drive risk assessments; business does. The old days of doing...

Read More

Enhancing Public Safety and Protecting Critical Infrastructure through Threat Insights

In our rapidly evolving digital landscape and smart cities, critical...

Read More

Web Application Pentesting and the Importance of Specialization with Tib3rius

Hello and welcome to another episode of The Phillip Wylie Show. Today, I am...

Read More