FREE Purple Team Workshops: Save Your Seat 🦄

Inner Circle Security Leader Dinners: RSVP Now 🦄

White Logo White Logo
White Logo
  • SOLUTIONS
    • SERVICES
      • PURPLE TEAM SERVICES
    • FOR BLUE TEAMS
    • FOR RED TEAMS
    • FOR PURPLE TEAMS
    • PRICING
  • RESOURCES
    • UNICORN LIBRARY
    • THREAT THURSDAY
    • DOWNLOADS
    • CISO STRESSED
  • COMPANY
    • INVESTORS
    • ADVISORY COUNCIL
    • CAREERS
    • PRESS
    • SWAG STORE
  • EVENTS
  • PARTNERS
  • CONTACT US
    • SUPPORT
  • SOLUTIONS
    • SOLUTIONS
    • SERVICES
      • PURPLE TEAM SERVICES
    • FOR BLUE TEAMS
    • FOR RED TEAMS
    • FOR PURPLE TEAMS
    • PRICING
  • RESOURCES
    • UNICORN LIBRARY
    • THREAT THURSDAY
    • DOWNLOADS
    • CISO STRESSED
  • COMPANY
    • COMPANY
    • INVESTORS
    • ADVISORY COUNCIL
    • CAREERS
    • PRESS
    • SWAG STORE
  • EVENTS
  • PARTNERS
  • CONTACT US
    • CONTACT US
    • SUPPORT
SCHEDULE A DEMO

IN THE NEWS

SCYTHE New Version 4.0 Unlocks Continuous Threat Analysis & Controls Validation
Business Wire
September 12, 2023
90: SBOM: The Future of Cybersecurity with Daniel Bardenstein
(CS)²AI Podcast Show
July 25, 2023
What Really Is the Threat in Cybersecurity?A Closer Look
dojo.live
July 6, 2023
Yikes! Open Source Red Team Tool Used By Hackers In Malware Attacks
The IT Nerd
April 19, 2023
DPRK threat actors target C3X and defense sector at large.
The CyberWire
April 13, 2023
Patch Tuesday overview.
The CyberWire
April 12, 2023
If You Didn’t Install April’s Patch Tuesday Updates, You Might Want To Do So ASAP As There’s An Actively Exploited Threat Out There
The IT Nerd
April 12, 2023
Leaked Pentagon documents claim that hackers breached a Canadian gas network. Here’s what to know.
The Washington Post
April 11, 2023
Next
1 / 19
Scythe Logo White
  • Why SCYTHE
  • Contact Us
  • Get a Demo
  • Pricing
  • Careers
  • Library

 

Privacy Notice

Cookie Policy

Terms and Conditions