Detection Content – The Trouble with Free
As organizations continue to mature and grow their threat hunting capabilities, especially as they incorporate more structured threat hunting into their operational cadence, a topic of concern
As organizations continue to mature and grow their threat hunting capabilities, especially as they incorporate more structured threat hunting into their operational cadence, a topic of concern
Effective post-hunt activity stands as one of the hidden threat hunting steps that cybersecurity organizations can take to maximize the ROI from their threat hunting
There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle
Last weekend, Cyborg Security hosted our first Capture the Flag (CTF) event. The CTF was oriented for people interested in threat hunting, cyber defense, blue
As organizations explore the use of threat hunting techniques, one important concept they can benefit from learning about is structured hunting (sometimes referred to as
As we are nearing the end of Cyborg Security’s official launch, we wanted to take this time to thank all those who were able to
We have nearly reached the end of Cyborg Security’s official launch of the HUNTER Platform. The journey to this point has been a phenomenal experience,
Cyborg Security has pioneered a new approach to threat hunting, crafted to overcome the gaps and inefficiencies in the SOC that automation can’t fix. The HUNTER Platform melds the power of human and technology to transform analysts into hunters.
Red Canary’s Atomic Red Team is a framework that enables analysts to quickly and easily validate if a detection or protection mechanism is capable of detecting or preventing an attacker’s technique. Join Brandon Denker, Cyborg Security’s Director of Research and Development, along with Red Canary to see how advanced engineers and research teams are using Atomic Red Team to build their own threat hunting platforms and products.
In this webcast, get an inside look on how to enable teams to observe more realistic threat activity in their own environment and prepare threat hunting plans and queries to prepare for real attacks.
Join Josh Campbell, Cyborg Security’s head of threat intelligence, as he introduces the topic of threat intelligence in a practical and common-sense approach. He will show what threat intelligence actually is, what it looks like, and how it can fit into the overall security operations lifecycle for organizations and managed service providers alike. This talk is geared towards threat intelligence professionals, organizations that want to build or mature their threat intelligence capability, and anyone who might be interested in the field of intelligence collection, analysis, and implementation.