Authored by: PlexTrac Author Posted on: May 19, 2020 PlexTrac Teams Up With SCYTHE to Streamline Security Posture Management May 20th, 2020 Boise, ID – The PlexTrac team is pleased to announce an integration with SCYTHE—one that is live on the platform right now! The SCYTHE platform provides an advanced attack emulation platform and helps enterprises continuously assess their risk posture and exposure. With this new integration, data on attack emulation activities obtained using SCYTHE can be easily imported into the PlexTrac platform and aggregated with other risk identification sources to provide a holistic information security risk register. This integration also facilitates easy construction and execution of true purple team engagements while also supporting collaborative remediation and analytics on progress. Interested in learning more about the partnership? Register to attend the “SCYTHE & PlexTrac Present: Dealin’ with the Data” webinar on Wednesday, June 3rd. Manage Data in One Integrated View – A Closer Look at the Integration SCYTHE results are instantly imported into PlexTrac providing a rich graphical interface to review and enrich the data. Each team member can rapidly access the level of detail they need—all the way down to the raw SCYTHE data. Blue teams can collaborate on remediation approaches and track remediation efforts at the individual asset level, facilitating the mitigation through detective or preventive controls. Managers can assign severities, provide guidance, and assign work to technicians in a single platform. With PlexTrac’s analytics, SCYTHE data is integrated with results from all other sources to identify risk in the organization’s environment, such as scans, pentests, audits and assessments. Below you can see screenshots of SCYTHE data in the PlexTrac platform: A List of Findings from SCYTHE in PlexTrac: The Preview Modal for a SCYTHE Finding: View of Retained Raw Data Continually Assess Risk Posture with SCYTHE SCYTHE is disrupting the traditional approach to information security by taking cyber security assessments to the next level. The SCYTHE platform provides an advanced attack emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. Customers can validate the true risk exposure of their business and employees and the performance of enterprise security teams and existing security solutions. Move Toward a Purple Teaming Paradigm with PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
From Risk to Resilience: 5 Steps to Speed Remediation and Protect Your Organization Security teams have one main goal: Avoid breaches. For anyone that works in security, you know this is easier said than done. With an influx of findings and risks coming at you from multiple sources, it can be daunting and time consuming trying to figure out what to fix first. We often see organizations making... READ ARTICLE
How Do I Pentest My LLM? In the world of cybersecurity, AI is the perpetual topic du jour, and more specifically Generative AI. The use of LLMs for all kinds of use cases is the craze and the AI ecosystem continues to move at a rapid pace. When it comes to pentesting, the job of every tester is to keep up... READ ARTICLE
What FedRAMP’s New Vulnerability Management Standard Means for Pentesters and Vuln Managers Breaking Down the New RFC-0012 Standard Under FedRAMP and How It Can Change Your Daily Security Operations If you work in vulnerability management or penetration testing for cloud systems under FedRAMP, buckle up because the new RFC-0012: FedRAMP Continuous Vulnerability Management Standard is going to change how your work is scoped, tracked, and prioritized. The... READ ARTICLE