No backup can land companies in serious trouble, warns Tinesh Chhaya, Founder at Decipher Cyber

With only a few weeks till the launch of Jenny 2.0, Tinesh Chhaya, Founder at Decipher Cyber, explores the different ways Jenny makes searching and analyzing cybersecurity vendors and service providers easier for businesses who are looking to upgrade their security systems, in this interview with Media 7. Read on to find out how businesses can make digital transformations and hybrid work environments safer from cyber-attacks.

People still write passwords down in notebooks and post-it notes.

MEDIA 7: With 17 years of experience in cybersecurity and research, what was the inspiration behind founding Jenny?
TINESH CHHAYA:
The real inspiration came from wanting to support users from within the cyber market, and outside of it, to help them make trusted and informed decisions on cyber security providers before they are bought, invested, or partnered with these companies. I wanted to build trust between users and suppliers, provide assurance and also have clarity on the information provided by the suppliers. Jenny is able to provide this, and with speed.


M7: You are four weeks away from launching Jenny V.2! Could you please shed some light on some of the latest developments on this SaaS Cyber Business Intelligence Platform?
TC:
Jenny V.1 focused on the marketing information provided by the vendor and only that. Jenny 2.0 re-enters into the market as a Cyber Business Intelligence Platform that offers a complete 360° view of security suppliers such as information on financials, the security posture of the supplier including Threat Intelligence, Third-party Risk assurance, employee information, third party review taken from global review companies, all supplier social media content and dive deep into the company collecting over 30 data points on the company, therefore providing a complete view on that supplier and allowing trust to be built easier with users.


Read More: Shaun Clark of HighLevel believes in pairing Artificial Intelligence with People Engagement


From a cyber perspective, the industry needs to ensure that the movement of digital information is regulated and monitored, protection is put in place for unauthorized access, which in turn would allow for confidentiality.



M7: How does Jenny help businesses find cybersecurity products and services that are right for them?
TC:
Jenny is like a search engine for information on security vendors. As we gather, organize, and categorize with supervised machine learning capabilities, Jenny enriches vendor information with critical profile data in near real-time. Our library science approach makes searching and analyzing vendors and service providers easier, and more natural. There is also human involvement whereby we contact the suppliers and further validate the information that Jenny has found along with asking them to furnish us with relevant information via an onboarding process.


M7: With a growing need for digital transformations, what are some of the biggest cybersecurity risks plaguing the industry?
TC:
From a cyber perspective, the industry needs to ensure that the movement of digital information is regulated and monitored, protection is put in place for unauthorized access, which in turn would allow for confidentiality. Internal security systems, security control, and technology integrity hardening would be key. Ensuring that security controls such as application vulnerability management, network security, and security monitoring would need to be considered as an organization moves along any sort of digital journey.

Read More: 'Blockchain technology's mass adoption problem can be solved by a multi-framework platform and interconnected environments' believes Yifan He


If a ransomware attack happened, you would be in serious trouble if all your data was gone in an instant.



M7: According to you, what are some of the best approaches that enterprises can adopt to improve the protection of their data in hybrid and remote working environments?
TC:
This is something that every enterprise has had to adapt and put into place since COVID-19 hit us all. For us, we started with some basics, such as enabling 2FA right across the teams to ensure we tighten up over the usual username and password efforts. Soon after, we spent time educating the teams to look out for suspicious emails, messages, and anything out of the ordinary. The main thing was for the employees to stop, think and alert our IT team if they have any concern at all before opening or pressing forward on an email, paying an invoice request from me, or even knowing who they are connecting to and through over an open WiFi network. We also asked staff to change passwords regularly which is easier said than done. People still write passwords down in notebooks and post-it notes. As a company, we back up every 15 mins, however, many companies don’t back up at all. If a ransomware attack happened, you would be in serious trouble if all your data was gone in an instant. Finally, we employ a lot of young people, and they like the freedom to be able to work flexibly and without any restrictions, so we have a rule - that they use their work devices responsibly and over lunch and breaks for personal things. 


M7: What are some of the different ways enterprises can utilize AI to drive large-scale shifts towards sustainability in their business models?
TC:
For us, Jenny helps reduce the carbon footprint. With over 9000 security global vendors, you can imagine that even with on a functional level, such as sales for example, the amount of travel each year from a client on each site leads to a lot of fuel being used. We are one of many AI-driven companies that are powered and provide our services through online, so as a collective, you can only imagine how much fuel we could save.

ABOUT DECIPHER CYBER

Decipher Cyber is the portal that provides an on-demand access to 360-degree trusted research and reviews on cyber technology vendors and service providers. Jenny 2.0, the revolutionary AI-driven platform that’s already helping thousands of users across the globe make more informed decisions on cyber. Jenny removes the risk from vendor analysis.

More THOUGHT LEADERS

Q&A with Shelton Newsham, Director and Founder at Newsham Business Solutions

Media 7 | May 12, 2021

Shelton Newsham, Director and Founder at Newsham Business Solutions, is a highly experienced board advisor, educator and public speaker and specialist in a number of areas enabling me to support management to identify risk, reduce exposure and achieve organisational objectives.He is a subject matter expert in many disciplines including process improvement, organsational assessment and information security. He has also worked closely with both UK Government agencies and international law enforcement....

Read More

Q&A with Alastair Speare-Cole, President of Insurance at QOMPLX

Media 7 | August 20, 2021

Alastair Speare-Cole, President and General Manager of the Insurance Division at QOMPLX, leads the overall strategy for the business unit, the development of QOMPLX’s underwriting-as-a-service platform, the management of the company’s Managing General Agent (MGA), as well as setting the direction for the company’s next-generation insurance decision platform that leverages a wide variety of data and advanced analytics to provide advanced risk and portfolio management solutions. Prior to joining QOMPLX, he served as Chief Underwriting Officer at Qatar, and he served as the CEO of JLT Towers from 2012 to 2015. He was also COO at Aon Re for ten years and has also held board appointments at reinsurance and banking subsidiaries in the United Kingdom....

Read More

'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker

Media 7 | November 23, 2021

In this interview with Diane Walker, Senior Director of Demand Generation at SonicWall, we had the opportunity to peek into SonicWall's latest high-performance firewall models that are aimed to combat the unprecedented surge of malware and ransomware resulting from a rise in remote and hybrid workforces across enterprises. She shared meaningful insights into SonicWall's vision of cybersecurity, and how modern-day marketers need to reflect on the different levels of the digital buyer journey. Read on to discover effective approaches towards marketing to drive business growth....

Read More

Q&A with Shelton Newsham, Director and Founder at Newsham Business Solutions

Media 7 | May 12, 2021

Shelton Newsham, Director and Founder at Newsham Business Solutions, is a highly experienced board advisor, educator and public speaker and specialist in a number of areas enabling me to support management to identify risk, reduce exposure and achieve organisational objectives.He is a subject matter expert in many disciplines including process improvement, organsational assessment and information security. He has also worked closely with both UK Government agencies and international law enforcement....

Read More

Q&A with Alastair Speare-Cole, President of Insurance at QOMPLX

Media 7 | August 20, 2021

Alastair Speare-Cole, President and General Manager of the Insurance Division at QOMPLX, leads the overall strategy for the business unit, the development of QOMPLX’s underwriting-as-a-service platform, the management of the company’s Managing General Agent (MGA), as well as setting the direction for the company’s next-generation insurance decision platform that leverages a wide variety of data and advanced analytics to provide advanced risk and portfolio management solutions. Prior to joining QOMPLX, he served as Chief Underwriting Officer at Qatar, and he served as the CEO of JLT Towers from 2012 to 2015. He was also COO at Aon Re for ten years and has also held board appointments at reinsurance and banking subsidiaries in the United Kingdom....

Read More

'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker

Media 7 | November 23, 2021

In this interview with Diane Walker, Senior Director of Demand Generation at SonicWall, we had the opportunity to peek into SonicWall's latest high-performance firewall models that are aimed to combat the unprecedented surge of malware and ransomware resulting from a rise in remote and hybrid workforces across enterprises. She shared meaningful insights into SonicWall's vision of cybersecurity, and how modern-day marketers need to reflect on the different levels of the digital buyer journey. Read on to discover effective approaches towards marketing to drive business growth....

Read More

Related News

Cloud Security

Palo Alto Networks Announces Intent to Acquire Cloud Security Start-up Dig Security

PR Newswire | November 01, 2023

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire cloud security start-up Dig Security, an innovative provider of Data Security Posture Management (DSPM). Today, almost 70% of organizations already have data stored in the public cloud1. With increased interest and adoption of generative AI, sensitive data is often even more spread out across cloud services, including distributed databases, vector databases, PaaS services, and more. Organizations need help identifying sensitive data, effectively managing user access, and implementing robust security measures to protect against internal and external threats. Simultaneously, the relentless surge in the volume and impact of cloud data breaches persists2, causing significant damage to enterprises. This underscores the critical role that DSPM will play within a comprehensive cloud security strategy. Dig's DSPM solution enables organizations to discover, classify, monitor, and protect sensitive data across all cloud data stores, which will give Palo Alto Networks' customers visibility into and control of their multi-cloud data estate. After the close of the proposed acquisition, Dig's capabilities will be seamlessly integrated into the Prisma® Cloud platform to provide near real-time data protection from code to cloud. Dig was founded by entrepreneurs Dan Benjamin, Ido Azran, and Gad Akuka. They will continue leading their teams in joining the Prisma Cloud team at Palo Alto Networks after closing. Lee Klarich, Chief Product Officer for Palo Alto Networks: "As companies build AI-enabled applications, there will be a substantial increase in the amount of data transferred to the cloud. Dig's highly innovative DSPM technology helps safely enable this shift, and its dedicated team will complement and help advance Palo Alto Networks' strengths across cloud security. The announcement of our intent to join forces with Dig reinforces our longstanding commitment to our team in Israel and to continue growing our footprint with its talented and dedicated cybersecurity professionals." Ankur Shah, SVP Products, Prisma Cloud for Palo Alto Networks: "Data protection was the top priority for cloud security cited in the 2023 The State of Cloud-Native Security Report. Upwards of 75% of respondents noted that the number of point tools they use creates blind spots. Dig lets security teams see and secure their data across multi-cloud environments. This visibility and security is becoming increasingly important in the age of generative AI. Dig's innovation, coupled with Prisma Cloud's leading code-to-cloud intelligence highlighted in the recent Darwin release, will create what CISOs need to drive complete cloud security and data protection with a single, integrated, cloud-native platform." Dan Benjamin, Co-Founder & CEO, Dig Security: "Modern cloud applications leverage a broad set of data stores to meet the complex needs of businesses. We developed an award-winning DSPM solution to alleviate this strain by providing a centralized offering to monitor and manage the security of these cloud data stores. Integrating Dig's technology with Prisma Cloud will enable customers to effectively manage the security of their diverse data stores in modern cloud applications and reduce the risk of data breaches. My co-founders and I look forward to continuing our innovation journey with Palo Alto Networks to make the world safer."

Read More

Platform Security

BLOKWORX Selects Stellar Cyber Open XDR Platform to Bolster its Managed Security Offering

Business Wire | October 31, 2023

Stellar Cyber, the innovator of Open XDR, announced today that a top 200 managed security service provider (MSSP), BLOKWORX, has added Stellar Cyber Open XDR Platform to its security stack to enhance context and increase the differentiation of its security offerings. Stellar Cyber’s Network Detection and Response (NDR) capabilities and unique ability to identify threats at the network layer played a pivotal role in BLOKWORX’s ultimate decision. The Stellar Cyber Open XDR Platform enables MSSPs to produce consistent security outcomes with existing staff. In addition, Stellar Cyber complements security teams’ human expertise, making them more productive and efficient. BLOKWORX is a leading MSSP delivering data-centric security services aimed at managed security providers (MSP) with limited in-house cybersecurity resources. BLOKWORX sets itself apart from other MSSPs with its extensive networking expertise. “Most MSSPs focus on the endpoint when it comes to threat detection, then broaden their efforts,” said Robert Boles, Founder & President of BLOKWORX. “While we can and do look at endpoints, together with Stellar Cyber, we take a more comprehensive approach, looking at all layers of the network, allowing us better to understand the real depth and breadth of a threat and more completely protect a client's network from cloud to edge to endpoint.” We are delighted that BLOKWORX underscores how the Stellar Cyber Open XDR Platform accentuates the differentiation and value they offer their customers, said Jim O’Hara, Stellar Cyber Chief Revenue Officer. BLOKWORX is already a deeply valued partner, and we look forward to developing our relationship further. BLOKWORX played a critical role in integrating Stellar Cyber and Deep Instinct. They invested significant cycles working with the dev teams from Stellar Cyber and Deep Instinct, ensuring the integration works as expected. The result is a resilient integration between the two products that protect enterprises globally. “BLOKWORX was an invaluable contributor to the integration work we completed with Deep Instinct,” said Andrew Homer, VP of Technology Alliances at Stellar Cyber. “When you see this type of dedication from a partner, you want to work harder to deliver the best possible outcomes, and that is what we did.” “We will not bring anything into our stack that doesn’t pass our comprehensive vetting process, especially when a product claims to be multi-tenant. Stellar Cyber checked every box in our vetting process,” added Robert Boles. Unlike other SecOps platforms requiring several multifaceted technical professionals to deploy, use, and maintain, the Stellar Cyber Open XDR Platform delivers NG-SIEM, NDR, UEBA, SOAR, and TIP capabilities in an efficient way that allows security analysts to focus on security operations. In addition, powered by deep learning AI and an “open” integration architecture, Stellar Cyber intelligently correlates alerts, logs, and telemetry data, providing security analysts with the holistic view of threats they need to mitigate them quickly. About Stellar Cyber Stellar Cyber delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai. About BLOKWORX Most IT Managed Service Providers can’t keep up with all the security options and threats that come at their clients on their own. BLOKWORX simplifies security solutions and constantly prevents cyber threats before they become catastrophic events so MSPs can protect their clients, reduce their risks and have peace of mind growing their business, with a trusted and proven security partner watching their backs. We Defend. We Protect. You Grow. For more information, visit www.blokworx.com.

Read More

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Cloud Security

Palo Alto Networks Announces Intent to Acquire Cloud Security Start-up Dig Security

PR Newswire | November 01, 2023

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire cloud security start-up Dig Security, an innovative provider of Data Security Posture Management (DSPM). Today, almost 70% of organizations already have data stored in the public cloud1. With increased interest and adoption of generative AI, sensitive data is often even more spread out across cloud services, including distributed databases, vector databases, PaaS services, and more. Organizations need help identifying sensitive data, effectively managing user access, and implementing robust security measures to protect against internal and external threats. Simultaneously, the relentless surge in the volume and impact of cloud data breaches persists2, causing significant damage to enterprises. This underscores the critical role that DSPM will play within a comprehensive cloud security strategy. Dig's DSPM solution enables organizations to discover, classify, monitor, and protect sensitive data across all cloud data stores, which will give Palo Alto Networks' customers visibility into and control of their multi-cloud data estate. After the close of the proposed acquisition, Dig's capabilities will be seamlessly integrated into the Prisma® Cloud platform to provide near real-time data protection from code to cloud. Dig was founded by entrepreneurs Dan Benjamin, Ido Azran, and Gad Akuka. They will continue leading their teams in joining the Prisma Cloud team at Palo Alto Networks after closing. Lee Klarich, Chief Product Officer for Palo Alto Networks: "As companies build AI-enabled applications, there will be a substantial increase in the amount of data transferred to the cloud. Dig's highly innovative DSPM technology helps safely enable this shift, and its dedicated team will complement and help advance Palo Alto Networks' strengths across cloud security. The announcement of our intent to join forces with Dig reinforces our longstanding commitment to our team in Israel and to continue growing our footprint with its talented and dedicated cybersecurity professionals." Ankur Shah, SVP Products, Prisma Cloud for Palo Alto Networks: "Data protection was the top priority for cloud security cited in the 2023 The State of Cloud-Native Security Report. Upwards of 75% of respondents noted that the number of point tools they use creates blind spots. Dig lets security teams see and secure their data across multi-cloud environments. This visibility and security is becoming increasingly important in the age of generative AI. Dig's innovation, coupled with Prisma Cloud's leading code-to-cloud intelligence highlighted in the recent Darwin release, will create what CISOs need to drive complete cloud security and data protection with a single, integrated, cloud-native platform." Dan Benjamin, Co-Founder & CEO, Dig Security: "Modern cloud applications leverage a broad set of data stores to meet the complex needs of businesses. We developed an award-winning DSPM solution to alleviate this strain by providing a centralized offering to monitor and manage the security of these cloud data stores. Integrating Dig's technology with Prisma Cloud will enable customers to effectively manage the security of their diverse data stores in modern cloud applications and reduce the risk of data breaches. My co-founders and I look forward to continuing our innovation journey with Palo Alto Networks to make the world safer."

Read More

Platform Security

BLOKWORX Selects Stellar Cyber Open XDR Platform to Bolster its Managed Security Offering

Business Wire | October 31, 2023

Stellar Cyber, the innovator of Open XDR, announced today that a top 200 managed security service provider (MSSP), BLOKWORX, has added Stellar Cyber Open XDR Platform to its security stack to enhance context and increase the differentiation of its security offerings. Stellar Cyber’s Network Detection and Response (NDR) capabilities and unique ability to identify threats at the network layer played a pivotal role in BLOKWORX’s ultimate decision. The Stellar Cyber Open XDR Platform enables MSSPs to produce consistent security outcomes with existing staff. In addition, Stellar Cyber complements security teams’ human expertise, making them more productive and efficient. BLOKWORX is a leading MSSP delivering data-centric security services aimed at managed security providers (MSP) with limited in-house cybersecurity resources. BLOKWORX sets itself apart from other MSSPs with its extensive networking expertise. “Most MSSPs focus on the endpoint when it comes to threat detection, then broaden their efforts,” said Robert Boles, Founder & President of BLOKWORX. “While we can and do look at endpoints, together with Stellar Cyber, we take a more comprehensive approach, looking at all layers of the network, allowing us better to understand the real depth and breadth of a threat and more completely protect a client's network from cloud to edge to endpoint.” We are delighted that BLOKWORX underscores how the Stellar Cyber Open XDR Platform accentuates the differentiation and value they offer their customers, said Jim O’Hara, Stellar Cyber Chief Revenue Officer. BLOKWORX is already a deeply valued partner, and we look forward to developing our relationship further. BLOKWORX played a critical role in integrating Stellar Cyber and Deep Instinct. They invested significant cycles working with the dev teams from Stellar Cyber and Deep Instinct, ensuring the integration works as expected. The result is a resilient integration between the two products that protect enterprises globally. “BLOKWORX was an invaluable contributor to the integration work we completed with Deep Instinct,” said Andrew Homer, VP of Technology Alliances at Stellar Cyber. “When you see this type of dedication from a partner, you want to work harder to deliver the best possible outcomes, and that is what we did.” “We will not bring anything into our stack that doesn’t pass our comprehensive vetting process, especially when a product claims to be multi-tenant. Stellar Cyber checked every box in our vetting process,” added Robert Boles. Unlike other SecOps platforms requiring several multifaceted technical professionals to deploy, use, and maintain, the Stellar Cyber Open XDR Platform delivers NG-SIEM, NDR, UEBA, SOAR, and TIP capabilities in an efficient way that allows security analysts to focus on security operations. In addition, powered by deep learning AI and an “open” integration architecture, Stellar Cyber intelligently correlates alerts, logs, and telemetry data, providing security analysts with the holistic view of threats they need to mitigate them quickly. About Stellar Cyber Stellar Cyber delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai. About BLOKWORX Most IT Managed Service Providers can’t keep up with all the security options and threats that come at their clients on their own. BLOKWORX simplifies security solutions and constantly prevents cyber threats before they become catastrophic events so MSPs can protect their clients, reduce their risks and have peace of mind growing their business, with a trusted and proven security partner watching their backs. We Defend. We Protect. You Grow. For more information, visit www.blokworx.com.

Read More

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Spotlight

Decipher Cyber

The portal that provides an on-demand access to 360-degree trusted research and reviews on cyber technology vendors and service providers. Jenny 2.0, the revolutionary AI-driven platform that’s already helping thousands of users across the globe make more informed decisions on cyber. Jenny removes t...

Events

Resources