Our Blog

White Paper

September 18, 2020

The Trouble with Attribution in Cyber Threat Intelligence (Part 1)

Within the field of cyber threat intelligence (CTI), there are few more contentious topics than that of attribution. Just the word evokes such a wide range of emotions from individuals in cyber security: from fascination, to myst...
Read more
Blog

September 10, 2020

Cyborg Security has partnered with VMware Carbon Black to provide a new, advanced contextualized Th...
Read more
Blog

September 8, 2020

Threat hunting is all about finding the unknown, and in order to find it you first need to be...
Read more
Blog

September 3, 2020

INTRODUCTION A matter of fact is that the world has, in the last several months, undergone...
Read more
Blog

August 28, 2020

Threat hunting, as a practice, will often identify new or previously undetected threats hidden with...
Read more
Blog

August 8, 2020

As organizations strive to mature their threat hunting processes, they’re increasingly finding th...
Read more
Blog

August 7, 2020

Cyborg Security is on a quest to provide the best threat hunting experience to organizations at all...
Read more
Blog

July 10, 2020

Introduction Perhaps one of the more controversial subjects in the field of cyber security is the ...
Read more
Blog

July 7, 2020

Earlier this year, Gartner analyst Pete Shoard wrote an interesting piece on the nature of ...
Read more
Blog

June 16, 2020

As the Cyber Threat and Operations Lead at Cyborg, I’ve been working with my team on a lot of fro...
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.