SCYTHE Announces $3 Million in Initial Financing Round Led by Gula Tech Adventures

SCYTHE Announces $3 Million in Initial Financing Round Led by Gula Tech Adventures

Bryson Bort
Earlier today we announced that we raised $3 million in an initial funding round led by the co-founder of Tenable, Ron Gula of Gula Tech Adventures. This investment will help accelerate our ability to deliver our attack simulation platform and drive new product development. We’ve planned a roadmap of new features and innovations that will disrupt the cybersecurity industry. We’re providing organizations the ability to get ahead of threats with real metrics and tangible examples of attacks and compromises.
Breach Reality Check: Get More Realistic with the Latest in Attack Simulation

Breach Reality Check: Get More Realistic with the Latest in Attack Simulation

SCYTHE

Today, SCYTHE unveiled unique enhancements to the SCYTHE attack simulation platform. This release allows measuring effectiveness of an enterprise’s security controls with granularity and prioritizing areas for real action across the entire enterprise against your people, technology or processes easier than ever before. Highlights:

Understanding the Real Cost of Pen Testing, Red Teaming and Blue Teaming

Understanding the Real Cost of Pen Testing, Red Teaming and Blue Teaming

Bryson Bort
The void in the cybersecurity workforce is compounding the level of risk faced by enterprises. The global shortage of skilled security workers could reach 1.8 million in the next five years according to the Center for Cyber Safety and Education. Contrast this with plans to boost security teams hiring by at least 15 percent in the same time frame - the numbers don’t add up. This is exacerbated by the increasing volume, variety and veracity of widespread cyberattacks like WannaCry, NotPetya, Locky, and other blockbuster ransomware.
Practical advice for real world problems

Practical advice for real world problems

Adam Nichols
Introduction Have you ever been trying to solve a systemic problem, like users getting infected by malware, and the only advice you get is completely impractical, such as to instruct users to not click on links or open attachments? This seems to be one of the top security recommendations lately, as if the solution was so simple. The good news is that there are some practical solutions out there for nearly every organization.
A Three-Step Approach to Threats: What All Organizations Should Know (but Equifax Doesn’t)

A Three-Step Approach to Threats: What All Organizations Should Know (but Equifax Doesn’t)

Bryson Bort
Within the context of historical cyber breaches, this can be classified as a massive attack: Equifax, one of the “big three” credit-rating agencies, announced earlier this month thathackers gained access to the Social Security numbers, credit card data, driver’s licenses, home addresses and other personally identifiable information (PII) of up to 143 million Americans. Some two-dozen class-action lawsuits (and counting?) followed, along with stinging criticism from consumer groups and congressional leaders.