Intermediate Purple Team Workshop on
Detection Engineering
PLATFORM
OVERVIEW
WHY SCYTHE
SERVICES
ADVANCED EMULATION SERVICES
PURPLE TEAM SERVICES
FOR BLUE TEAMS
FOR RED TEAMS
FOR PURPLE TEAMS
RESOURCES
LIBRARY
THREAT THURSDAY
DOWNLOADS
CISO STRESSED
COMPANY
ABOUT
INVESTORS
ADVISORY COUNCIL
PARTNERS
CONSULTING
MANAGED SECURITY
CYBER RANGES
CAREERS
PRESS & EVENTS
SWAG STORE
PRICING
SUPPORT
CONTACT US
PLATFORM
OVERVIEW
WHY SCYTHE
SERVICES
ADVANCED EMULATION SERVICES
PURPLE TEAM SERVICES
FOR BLUE TEAMS
FOR RED TEAMS
FOR PURPLE TEAMS
RESOURCES
LIBRARY
THREAT THURSDAY
DOWNLOADS
CISO STRESSED
COMPANY
ABOUT
INVESTORS
ADVISORY COUNCIL
PARTNERS
CONSULTING
MANAGED SECURITY
CYBER RANGES
CAREERS
PRESS & EVENTS
SWAG STORE
PRICING
SUPPORT
CONTACT US
SCHEDULE A DEMO
IN THE NEWS
Severe vulnerabilities found in most industrial controllers
The Washington Post
December 14, 2022
‘Purple team’ approach boosts cybersecurity
Credit Union National Association
November 22, 2022
State-sponsored hackers target Ukraine
Washington Examiner
October 6, 2022
The dread, sincerity and comedy of Cybersecurity Awareness Month
Washington Post
October 4, 2022
Episode 23: Using Automation for Stronger Cyber Threat Intelligence, Red Team, and Blue Team Collaboration
The CYBER5
September 10, 2022
SCYTHE’s Elizabeth Wharton Named Cybersecurity or Privacy Woman Law Professional for 2022 By United Cybersecurity Alliance
Businesswire
August 25, 2022
Military Personnel Need Watch How They Use Social Media
Forbes
July 15, 2022
Cyber Defense: Bryson Bort of SCYTHE On The 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack
Medium
July 6, 2022
Next
1 / 17