Category: Library Video

Library Video

Black Hat Webcast Series | Practical Threat Hunting

A lot has been said about threat hunting, by a lot of people. They’ll tell you how difficult it is, what products you should use, how to automate the pain away, and how you should’ve been doing this all along. But here’s the thing…you have been doing it all along.

Watch the recording of the Black Hat Webcast Series to listen to our speakers as they present the need to know information on practical threat hunting.

Read More »
Library Video

Begin the Hunt.

Cyborg Security has pioneered a new approach to threat hunting, crafted to overcome the gaps and inefficiencies in the SOC that automation can’t fix. The HUNTER Platform melds the power of human and technology to transform analysts into hunters.

Read More »
Library Video

Validating Your Detections With Red Canary’s Atomic Red Team and Cyborg’s Cyber Threat Emulation

Red Canary’s Atomic Red Team is a framework that enables analysts to quickly and easily validate if a detection or protection mechanism is capable of detecting or preventing an attacker’s technique. Join Brandon Denker, Cyborg Security’s Director of Research and Development, along with Red Canary to see how advanced engineers and research teams are using Atomic Red Team to build their own threat hunting platforms and products.

In this webcast, get an inside look on how to enable teams to observe more realistic threat activity in their own environment and prepare threat hunting plans and queries to prepare for real attacks.

Read More »
Library Video

The Commonsense Approach to Threat Intelligence

Join Josh Campbell, Cyborg Security’s head of threat intelligence, as he introduces the topic of threat intelligence in a practical and common-sense approach. He will show what threat intelligence actually is, what it looks like, and how it can fit into the overall security operations lifecycle for organizations and managed service providers alike. This talk is geared towards threat intelligence professionals, organizations that want to build or mature their threat intelligence capability, and anyone who might be interested in the field of intelligence collection, analysis, and implementation.

Read More »