![SCYTHE Profile](https://pbs.twimg.com/profile_images/1788971034168700931/mA5uFh1t_x96.jpg)
SCYTHE
@scythe_io
Followers
7K
Following
6K
Statuses
5K
The most advanced attack emulation platform on the market. Know where you stand with the real thing. 🦄
Columbia, MD
Joined October 2017
For Continuous Threat Exposure Management (CTEM) and Breach and Attack Simulation (BAS), efficiency and scalability are what's matters the most. Unlike traditional BAS requiring agents on every endpoint, SCYTHE’s streamlined approach delivers faster, more effective security testing. Let our VP of Sales and Product @Marc_R_Brown show you how it works: #BAS
#BreachandAttack
0
1
2
Our SIGMA #workshop is back 🦄 Master #SIGMA rules & streamline your security stack! Why waste time duplicating detection rules across multiple tools? With SIGMA rules, you can write it once and apply it everywhere. Join our LIVE hands-on workshop on Feb 26 from 1PM to 4PM ET and learn how to: ✅ Turn CTI into custom detections ✅ Write your first SIGMA rule ✅ Deploy it across your security stack in our lab ✅ Test it in real-time with SCYTHE’s threat emulation Save your seat now and level up your detection engineering skills: @1qazCasey
@TCraf7
0
3
4
If you missed our CTI workshop, here's Tyler Casey (@1qazCasey) showing you how to look for the same threat actor across multiple sources when performing cyber intelligence gatherings. Sign up to our February workshop on SIGMA here: #SIGMA
#CybersecurityWorkshop
0
0
2
The defender, just like the 🕷️ and the 🕸️ gets to understand what an unknown environment looks like. But, the problem is how do we get the defender to understand what a trip in the spiderweb looks like? Watch to hear Ian Anderson explain 😎 And since you're at it, take a look at how we do things at SCYTHE: @brysonbort
#AdversarialThreatEmulation
1
1
2
Safer Internet Day Reminder: Catch threats before they catch you 👀 95% of breaches still stem from human error. Are you testing your defenses as often as attackers do? The interesting thing is that while security teams work hard to prevent breaches, attackers are constantly evolving their tactics. The longer a threat lingers undetected in your environment (known as dwell time), the greater the damage it can cause. Studies show that attackers can remain inside networks for weeks or even months before detection, exfiltrating data, escalating privileges, and moving laterally. This is where Breach and Attack Simulation (BAS) becomes invaluable. Instead of waiting for a real attack to test your security posture, BAS continuously emulates adversary tactics in a controlled environment. It helps organizations identify weaknesses, validate security controls, and reduce dwell time by improving detection and response capabilities. If attackers are always testing your defenses, shouldn’t you be doing the same? You know you should. Let us take you through what our model can do for you: #SaferInternetDay
0
0
1
The most common threat vector in OT is IT. But, we'll let @brysonbort tell you more about what he means by that 😎 P.S: See what SCYTHE can do for your organization: #OT
#IT
0
0
0
Tune in today! Join Bryson Bort (@brysonbort), Founder of SCYTHE, and Jennifer Leggio (@mediaphyter), Chief Strategy Officer at @W2Comm, for an unfiltered, dynamic discussion on the toughest challenges in cybersecurity marketing and GTM strategies: #CybersecurityMarketing
Join Bryson Bort (@brysonbort), Founder of SCYTHE, and Jennifer Leggio (@mediaphyter), Chief Strategy Officer at @W2Comm, for an unfiltered, dynamic discussion on the toughest challenges in cybersecurity marketing and GTM strategies 😎 They’ll tackle: 🔹 Cutting through the noise in a saturated market. 🔹 Translating complex tech for non-tech buyers. 🔹 Syncing marketing + sales for max impact. 🔹 Building trust in a risk-averse industry. 🔹 Navigating long sales cycles and tricky procurement. Packed with real-world insights and actionable advice, this is a must-watch for cybersecurity leaders and marketers. Save your seat: #CybersecurityMarketing
0
0
1
Talking about cybersecurity strategies, @brysonbort encourages organizations to build a proper defensible architecture by not taking the Purdue model as religion. 🦄 If you haven't seen our platform in action, watch our demo: #purpleteaming
#purpleteam
0
1
2
Join our Threat Thursday today from 12 PM ET for a session on Endpoint Hygiene (Linux, macOS, Windows) and learn: →Sending targeted endpoint campaigns. →CAT I STIG checks for cyber hygiene. →Strengthening controls & ensuring compliance. Save your seat: @1qazCasey
@TCraf7
We're not hosting a Threat Thursday session today, but on 30 Jan from 12PM ET, Tyler Casey (@1qazCasey) and Trey Bilbrey (@TCraf7) are diving into "Endpoint Hygiene (Linux, macOS, Windows)", a must-attend session for anyone focused on securing endpoints across diverse operating systems. What you’ll learn: ✔️ How to send targeted campaigns to endpoints for proactive defense. ✔️ Conduct CAT I STIG checks to establish strong cyber hygiene baselines. ✔️ Identify and apply security controls to ensure compliance and enhance endpoint security. If securing diverse endpoints is a priority for your organization, this session is your next step toward a stronger cybersecurity posture. Seats are filling up. Save yours: #Cybersecurity
#EndpointSecurity
0
0
1
Tomorrow's the day 🦄 From 12PM ET, don’t miss our Threat Thursday on Endpoint Hygiene (Linux, macOS, Windows) – a must attend for anyone managing endpoint security. What you’ll learn: ✔️ How to target and send campaigns directly to endpoints. ✔️ Conducting CAT I STIG checks to establish a strong cyber hygiene baseline. ✔️ Identifying and reinforcing key security controls. ✔️ Ensuring compliance across various operating systems. Whether you're looking to strengthen defenses or elevate your organization's overall security posture, this session is packed with actionable insights. Register now: @1qazCasey
@TCraf7
This week join us for our Threat Thursday on Endpoint Hygiene (Linux, macOS, Windows) = a game-changer for anyone managing endpoint security. What you’ll learn: ✔️How to send targeted campaigns to endpoints. ✔️Conducting CAT I STIG checks for a solid cyber hygiene baseline. ✔️Identifying and strengthening security controls. ✔️ Ensuring compliance across multiple operating systems. Whether you're focused on bolstering defenses or enhancing your organization's overall security posture, this session is packed with actionable insights. Register here: @TCraf7
@1qazCasey
#CybersecurityEvents
#EndpointHygiene
0
0
2
We're starting the 'Starting your own CTI Program' workshop from 1PM today! ✅Learn about the Different Types of CTI. ✅Get hands on Practicing Threat Modeling. ✅Practice gathering information and writing a threat report for a fictitious organization. Save your seat: @1qazCasey
@TCraf7
Expectation vs. reality when you attend a CTI workshop, but it doesn’t have to be that way. The team at SCYTHE makes sure you’re NOT going to forget how to apply what you learned. Don’t believe us? Join their next CTI workshop on Jan 29 from 1pm to 4pm ET and: ✅ Learn about the Different Types of CTI. ✅ Get hands on Practicing Threat Modeling. ✅ Practice gathering information and writing a threat report for a fictitious organization. Save your seat: #CTI
#CyberThreatIntelligence
0
0
1
RT @brysonbort: I have been working on this project since 2016 when Target first came to me. In 2018, I raised VC not just for the money,…
0
3
0
@brysonbort, our Founder & CEO, did this very cool thing—an entire hour walking the audience through a live SCYTHE demo on @TheRSnakeShow 🦄 Here’s a sneak peek of the action. P.S. Tired of wasting money on pen testing that doesn’t deliver what you need? Let’s talk about taking adversarial threat emulation seriously. We’re ready when you are: #ThreatEmulation
#CyberThreats
0
2
6
This week join us for our Threat Thursday on Endpoint Hygiene (Linux, macOS, Windows) = a game-changer for anyone managing endpoint security. What you’ll learn: ✔️How to send targeted campaigns to endpoints. ✔️Conducting CAT I STIG checks for a solid cyber hygiene baseline. ✔️Identifying and strengthening security controls. ✔️ Ensuring compliance across multiple operating systems. Whether you're focused on bolstering defenses or enhancing your organization's overall security posture, this session is packed with actionable insights. Register here: @TCraf7
@1qazCasey
#CybersecurityEvents
#EndpointHygiene
0
1
2