Join the Next Purple Team Workshop!
Save Your Seat
🦄
PLATFORM
OVERVIEW
WHY SCYTHE
SERVICES
PURPLE TEAM SERVICES
FOR BLUE TEAMS
FOR RED TEAMS
FOR PURPLE TEAMS
RESOURCES
LIBRARY
THREAT THURSDAY
DOWNLOADS
WORKSHOPS
CISO STRESSED
COMPANY
ABOUT
INVESTORS
ADVISORY COUNCIL
PARTNERS
CONSULTING
MANAGED SECURITY
CYBER RANGES
CAREERS
PRESS & EVENTS
SWAG STORE
PRICING
SUPPORT
CONTACT US
PLATFORM
OVERVIEW
WHY SCYTHE
SERVICES
PURPLE TEAM SERVICES
FOR BLUE TEAMS
FOR RED TEAMS
FOR PURPLE TEAMS
RESOURCES
LIBRARY
THREAT THURSDAY
DOWNLOADS
WORKSHOPS
CISO STRESSED
COMPANY
ABOUT
INVESTORS
ADVISORY COUNCIL
PARTNERS
CONSULTING
MANAGED SECURITY
CYBER RANGES
CAREERS
PRESS & EVENTS
SWAG STORE
PRICING
SUPPORT
CONTACT US
SCHEDULE A DEMO
Articles about Policy
September 16, 2022
New OMB Guidance to Software Producers
Read article
February 04, 2022
Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
Read article
August 16, 2021
Malware Risks in Open Source Code
Read article
July 22, 2021
Malicious Uses of Blockchains
Read article
June 17, 2021
TSA Pipeline Security Guidelines and ADR
Read article
May 21, 2021
We joined 18 other companies to call for a prioritization of Critical Infrastructure security in the American Jobs Plan.
Read article
January 28, 2021
Red Team Non-Attributable Infrastructure and the Executive Order
Read article
January 20, 2021
Parsing an Executive Order: Streaming on Your TV Soon
Read article
July 10, 2020
Breaching Terms of Service Doesn’t Breach the CFAA: Protect Independent Security Research
Read article
January 28, 2020
What Is Real-ID And Why Should You Care | A Conversation With Elizabeth Wharton & Steve Luczynski
Read article