Authored by: PlexTrac Author Posted on: May 19, 2020 PlexTrac Teams Up With SCYTHE to Streamline Security Posture Management May 20th, 2020 Boise, ID – The PlexTrac team is pleased to announce an integration with SCYTHE—one that is live on the platform right now! The SCYTHE platform provides an advanced attack emulation platform and helps enterprises continuously assess their risk posture and exposure. With this new integration, data on attack emulation activities obtained using SCYTHE can be easily imported into the PlexTrac platform and aggregated with other risk identification sources to provide a holistic information security risk register. This integration also facilitates easy construction and execution of true purple team engagements while also supporting collaborative remediation and analytics on progress. Interested in learning more about the partnership? Register to attend the “SCYTHE & PlexTrac Present: Dealin’ with the Data” webinar on Wednesday, June 3rd. Manage Data in One Integrated View – A Closer Look at the Integration SCYTHE results are instantly imported into PlexTrac providing a rich graphical interface to review and enrich the data. Each team member can rapidly access the level of detail they need—all the way down to the raw SCYTHE data. Blue teams can collaborate on remediation approaches and track remediation efforts at the individual asset level, facilitating the mitigation through detective or preventive controls. Managers can assign severities, provide guidance, and assign work to technicians in a single platform. With PlexTrac’s analytics, SCYTHE data is integrated with results from all other sources to identify risk in the organization’s environment, such as scans, pentests, audits and assessments. Below you can see screenshots of SCYTHE data in the PlexTrac platform: A List of Findings from SCYTHE in PlexTrac: The Preview Modal for a SCYTHE Finding: View of Retained Raw Data Continually Assess Risk Posture with SCYTHE SCYTHE is disrupting the traditional approach to information security by taking cyber security assessments to the next level. The SCYTHE platform provides an advanced attack emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. Customers can validate the true risk exposure of their business and employees and the performance of enterprise security teams and existing security solutions. Move Toward a Purple Teaming Paradigm with PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Why PlexTrac is an ideal fit for midsize enterprise organizations Midsize enterprise (MSE) security leaders are in a uniquely challenging position: they’re expected to reduce risk, show measurable progress, and keep pace with new threats without the staffing, time, or budget of a large enterprise security organization. That’s why choosing the right exposure management platform matters. The best fit usually isn’t the biggest, most robust... READ ARTICLE
Outsourced vs Internal Pentesting Is Not the Decision You Think It Is One of the most common questions I hear from security teams is whether they should outsource pentesting or bring it in house. It is usually framed as a fork in the road. Pick one path and commit. I think that framing is wrong. The real issue is not who runs the pentest. It is whether... READ ARTICLE
Bridging Red and Blue Teams With Automated Pentest Delivery For decades, security programs have been shaped by a familiar dynamic: red team versus blue team. Red teams think like attackers, probing systems through attack simulation to uncover weaknesses. Blue teams defend, detect, and respond, working to validate vulnerabilities, remediate risk, and keep the business running. In theory, this tension is healthy. In practice, it often creates friction. READ ARTICLE