Our Blog

White Paper

November 17, 2020

3 Threat Hunting Myths You Shouldn’t Believe

Introduction Threat hunting activities can generate tremendous benefit for organizations, and not just in finding hidden active threats in the environment. When done regularly, threat hunting can feed SOC threat detection capabilities...
Read more
Blog

November 12, 2020

As organizations continue to mature and grow their threat hunting capabilities, especially as they ...
Read more
Blog

November 5, 2020

Effective post-hunt activity stands as one of the hidden threat hunting steps that cybersecurity or...
Read more
Blog

October 27, 2020

As organizations explore the use of threat hunting techniques, one important concept they can benef...
Read more
Blog

October 22, 2020

As we are nearing the end of Cyborg Security’s official launch, we wanted to take this time to th...
Read more
Blog

October 21, 2020

We have nearly reached the end of Cyborg Security’s official launch of the HUNTER Platform...
Read more
Blog

October 13, 2020

Understaffed security operations teams and overworked threat hunting teams are drowning in data, mu...
Read more
Blog

October 13, 2020

Cyborg Security Introduces New Platform for Threat Hunting HUNTER Platform makes advanced threat h...
Read more
Blog

October 8, 2020

Cyborg Security has partnered with Elastic to provide contextual threat intelligence and “in-to...
Read more
Blog

September 29, 2020

In a previous blog we discussed how crucial network log data is for threat hunters...
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.