January 13 2019
September 25 2018
SCYTHE recently announced a $3m round led by Gula Tech Adventures and an experienced group of cyber investors and operators. SCYTHE enables organizations to emulate advanced malicious cyber activity and see how well their organization is at preventing, detecting and repelling these types of threats. In this blog, I ask SCYTHE founder and CEO, Bryson Bort, a variety of questions about the origin of SCYTHE and the platform’s use cases. Read More…
May 14 2017
Note — I’ve known Marcus for a long time since he did “Dojosec” here in Maryland. I am an investor an adviser at ThreatCare. I like the ease of use it brings to testing and training your security staff and making sure your expensive array of security products is working as expected. Many security vendors are using it to demo their products and avoid a “Tanium” moment. I conducted the following interview with Marcus over email.
February 08 2017
If you are going to RSA and walk the vendor floor, keep in mind that the vast majority the vendors you will meet are not designed to work together. You may be able to centralize their logs and even orchestrate a cohesive incident response to an event, but you won’t automatically know if you are PCI Compliant, if you have a gaping hole in your NIST Cyber Security Framework program or if your span port is down and all of your DLPs and IPSes are now blind. An answer to this is to look for solutions that can measure your defenses across all of your defensive technologies and identify gaps in your security specified by frameworks written in house, or by vetted industry experts and groups such as PCI, NIST and CIS.