SCYTHE 4.0 empowers team collaboration in real-world adversarial campaigns

SCYTHE has unveiled its latest version of the SCYTHE Core platform, introducing a number of new features designed to provide essential insight into the exploitability, impact, and prioritization of threats.

SCYTHE 4.0 introduces dual-deployment options, supporting agentless and agent-based configurations. This dual support empowers security teams to execute comprehensive emulations across a broad spectrum of IT and OT/ICS assets, accommodating various deployment scenarios.

One of the features of SCYTHE 4.0 is its agent deployment capability, facilitating continuous control validation. This functionality holds potential to enhance security posture by ensuring ongoing alignment with established security controls.

Additionally, SCYTHE is set to offer a SaaS early access product, with general availability slated shortly after. The release also includes significant user experience enhancements aimed at streamlining the creation of threat campaigns and control validation tests.

Moreover, built-in SIGMA rules further elevate the platform’s capabilities, ensuring seamless alignment with industry-standard threat detection and response strategies.

A highlight of SCYTHE’s latest release is its commitment to collaboration. With a revamped UI, the platform simplifies campaign management, enhances team communication, and fosters stronger linkage between blue, red, and purple teams.

Whether on-prem or SaaS, SCYTHE is poised to break down barriers, enabling security teams to collaborate effectively as purple teams for adversary emulation.

Marc Brown, Head of Product, emphasized that many improvements directly resulted from ongoing valuable customer feedback looking for continuous test and deployment flexibility.

This release signifies SCYTHE’s dedication to evolving and amplifying proactive cybersecurity demands. With its capabilities and dynamic approach, SCYTHE is set to redefine the landscape of cybersecurity risk management through actionable threat intelligence.

Additionally, several more fast-follow capabilities are planned, including an AI-powered chat interface to transform how users interact with SCYTHE and a broader array of EDR, Vulnerability Management, SOAR, and ITSM integrations.

More about

Don't miss