Our Blog

White Paper

March 3, 2021

Threat Hunting Maturity Model: A New Approach for Structured Hunting

We've talked a lot about threat hunting in the past few months. From how to do it, what you need, and even how you can follow up on hunts. Something we haven't covered though is maturity, and how teams can measure that. For some, measu...
Read more
Blog

February 23, 2021

The cyber security industry likes acronyms...
Read more
Blog

February 19, 2021

You know what was one of my favourite hobbies pre-2020 (and I mean besides threat hunting, of cours...
Read more
Blog

February 16, 2021

Let's face it, the cyber security industry is full of strong opinions...
Read more
Blog

February 9, 2021

A colleague asked me about what are the best threat intelligence tools I use for data manipulation ...
Read more
Blog

February 2, 2021

If you have been looking for useful resources for cyber threat hunting, we’ve got you covered...
Read more
Blog

January 26, 2021

I don’t think anyone would dispute that cyber security has a problem with buzzwords...
Read more
Blog

January 20, 2021

Let's face it: threat hunting is a tool and technology-intensive discipline...
Read more
Blog

January 14, 2021

It is safe to say that 2020 was a year of “the new normal” for everyone, and doubly so for secu...
Read more
Blog

January 12, 2021

Cyborg Security, the pioneer in threat hunting and detection content, has released several free com...
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.