Attack Simulation

Scythe CEO, Bryson Bort on Security Weekly #589

Screen Shot 2019-01-13 at 10.19.41 AM

Bryson Bort did an excellent job speaking about @SCYTHE on episode #589 of SecurityWeekly. Bryson discusses red team automation and attack simulation with the show hosts including Paul Asadoorian and Jeff Man.
Read More…

Interview with SCYTHE founder and CEO, Bryson Bort

1*duJZkUtFS1S_LPvtNV-qgQ

SCYTHE recently announced a $3m round led by Gula Tech Adventures and an experienced group of cyber investors and operators. SCYTHE enables organizations to emulate advanced malicious cyber activity and see how well their organization is at preventing, detecting and repelling these types of threats. In this blog, I ask SCYTHE founder and CEO, Bryson Bort, a variety of questions about the origin of SCYTHE and the platform’s use cases. Read More…

ThreatCare CEO Marcus Carey Interview — Simulating attacks with ease

0*dY-DddgFXkTaWkFf

Note — I’ve known Marcus for a long time since he did “Dojosec” here in Maryland. I am an investor an adviser at ThreatCare. I like the ease of use it brings to testing and training your security staff and making sure your expensive array of security products is working as expected. Many security vendors are using it to demo their products and avoid a “Tanium” moment. I conducted the following interview with Marcus over email.
Read More…

While Visiting RSA 2017, Don’t Forget About Testing Security Controls


0*UU5ZoDh5zxElbWEh
If you are going to RSA and walk the vendor floor, keep in mind that the vast majority the vendors you will meet are not designed to work together. You may be able to centralize their logs and even orchestrate a cohesive incident response to an event, but you won’t automatically know if you are PCI Compliant, if you have a gaping hole in your NIST Cyber Security Framework program or if your span port is down and all of your DLPs and IPSes are now blind. An answer to this is to look for solutions that can measure your defenses across all of your defensive technologies and identify gaps in your security specified by frameworks written in house, or by vetted industry experts and groups such as PCI, NIST and CIS.
Read More…