Managed Services
Penetration Testing as-a-Service
–
The evolution of penetration testing into a self service realtime assessment
Red Team-as-a-Service
–
Continuous attack surface management and testing to uncover your risk
Managed Detection & Response
–
Harness the power of automation to scale threat hunting to turn events into insights
Vulnerability Management-as-a-Service
–
Manage vulnerabilities across your entire attack surface in one view
Our Platform
Mage
–
Centralized adversary simulation detection and response platform to deliver industrialized security as-a-service
Voodoo
–
Execute astute red teaming with the power of Voodoo
Services
Penetration Testing
–
Find vulnerabilities in your networks, applications, IoT, and the cloud
Security Engineering & Architecture Services
–
Our engineers specialize in developing, implementing and operating resilient and proactive architectures
Cloud Security
–
Enterprise security assessment, consulting, engineering and monitoring for cloud systems
Federal
–
Mission critical services for the federal government
Training
Astute Cloud Red Team
–
Learn the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms
Astute Red Teaming
–
Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course
Astute Yara
–
YARA is a free, open source pattern matching tool for hunting threats, malware and other specific patterns in files
Astute Zombie Crush
–
Hands-on lab where we apply knowledge to research and develop exploits for malicious C2 servers commonly used by Black hat hackers
Resources
Thought Leadership
Blog
–
Read the latest from our leading cybersecurity engineers
Data Sheets
Product/Service Information
–
View product information about our cybersecurity services
Use Cases
Zero Trust
–
We help organizations create a comprehensive approach to zero trust security
Company
About Us
–
Our team of security experts innovate to deliver the best cybersecurity solutions
Careers
–
Make a difference by building your career in cybersecurity
Contact Us
Stage 2 Security
>
Resources
Resources
Browse our blog and download our data sheets, service descriptions, and product sheets.
Filter by
Blog
Data Sheet
EULA
Service Description
Blog
Reset Filter
Most Recent
Oldest
A to Z
Z to A
Showing 1 - 10 of 16
Blog
Splunk TLS: Part 2 – Securing Port 8089
Ryan Adler
September 2, 2022
Blog
Splunk TLS: Part 1 – Securing Web
Ryan Adler
September 2, 2022
Blog
Quirks in the Go Lang Process Initialization
Waylon Grange
July 19, 2022
Blog
The Future of the Pentest Industry
Bryce Kunz
October 15, 2021
Blog
Voodoo Version 1.12 Released
Waylon Grange
September 23, 2021
Blog
S2 Hits Las Vegas and Wins a DEF CON “Black Badge”
Ciara Cartwright
August 12, 2021
Blog
Zero Trust & Recent Presidential Executive Order:
Charles Zepeda
May 24, 2021
Blog
Can solar controllers be used to generate fake clean energy credits?
Waylon Grange
May 17, 2021
Blog
AWS API Gateway fronting for Command and Control
Waylon Grange
September 8, 2020
Blog
Splunk TLS
Ryan Adler
August 14, 2020
Prev
1
of
2
Next