Our Blog

White Paper

November 5, 2020

After the Hunt: How to Follow Up on Cyber Threat Hunting Findings

Effective post-hunt activity stands as one of the hidden threat hunting steps that cybersecurity organizations can take to maximize the ROI from their threat hunting programs. The measures organizations take to follow-up on their cyber...
Read more
Blog

October 27, 2020

As organizations explore the use of threat hunting techniques, one important concept they can benef...
Read more
Blog

October 22, 2020

As we are nearing the end of Cyborg Security’s official launch, we wanted to take this time to th...
Read more
Blog

October 21, 2020

We have nearly reached the end of Cyborg Security’s official launch of the HUNTER Platform...
Read more
Blog

October 13, 2020

Understaffed security operations teams and overworked threat hunting teams are drowning in data, mu...
Read more
Blog

October 13, 2020

Cyborg Security, a pioneer in threat hunting, today announced a new threat hunting content platform...
Read more
Blog

October 8, 2020

Cyborg Security has partnered with Elastic to provide contextual threat intelligence and “in-to...
Read more
Blog

September 29, 2020

In a previous blog we discussed how crucial network log data is for threat hunters...
Read more
Blog

September 26, 2020

Cyborg Security has partnered with Splunk to provide contextual threat intelligence and “in-tool...
Read more
Blog

September 18, 2020

Within the field of cyber threat intelligence (CTI), there are few more contentious topics th...
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.