Managed Services
Penetration Testing as-a-Service
–
The evolution of penetration testing into a self service realtime assessment
Red Team-as-a-Service
–
Continuous attack surface management and testing to uncover your risk
Managed Detection & Response
–
Harness the power of automation to scale threat hunting to turn events into insights
Vulnerability Management-as-a-Service
–
Manage vulnerabilities across your entire attack surface in one view
Our Platform
Mage
–
Centralized adversary simulation detection and response platform to deliver industrialized security as-a-service
Voodoo
–
Execute astute red teaming with the power of Voodoo
Services
Penetration Testing
–
Find vulnerabilities in your networks, applications, IoT, and the cloud
Security Engineering & Architecture Services
–
Our engineers specialize in developing, implementing and operating resilient and proactive architectures
Cloud Security
–
Enterprise security assessment, consulting, engineering and monitoring for cloud systems
Federal
–
Mission critical services for the federal government
Training
Astute Cloud Red Team
–
Learn the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms
Astute Red Teaming
–
Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course
Astute Yara
–
YARA is a free, open source pattern matching tool for hunting threats, malware and other specific patterns in files
Astute Zombie Crush
–
Hands-on lab where we apply knowledge to research and develop exploits for malicious C2 servers commonly used by Black hat hackers
Resources
Thought Leadership
Blog
–
Read the latest from our leading cybersecurity engineers
Data Sheets
Product/Service Information
–
View product information about our cybersecurity services
Use Cases
Zero Trust
–
We help organizations create a comprehensive approach to zero trust security
Company
About Us
–
Our team of security experts innovate to deliver the best cybersecurity solutions
Careers
–
Make a difference by building your career in cybersecurity
Contact Us
Stage 2 Security
>
Resources
Resources
Browse our blog and download our data sheets, service descriptions, and product sheets.
Filter by
Blog
Data Sheet
EULA
Service Description
Most Recent
Oldest
A to Z
Z to A
Showing 11 - 20 of 21
Data Sheet
RTaaS Data Sheet
June 23, 2021
Blog
Zero Trust & Recent Presidential Executive Order:
Charles Zepeda
May 24, 2021
Blog
Can solar controllers be used to generate fake clean energy credits?
Waylon Grange
May 17, 2021
Blog
AWS API Gateway fronting for Command and Control
Waylon Grange
September 8, 2020
Blog
Splunk TLS
Ryan Adler
August 14, 2020
Blog
Navigating Splunk Docs and Answers
Ryan Adler
August 7, 2020
Blog
How to Validate Your Sigma Rules Using Sigmalint
Ryan Adler
July 25, 2020
Blog
AWS CloudTrail Logging Logic Flaw
Bryce Kunz
July 23, 2020
Blog
Anchor_dns malware goes cross platform
Waylon Grange
July 13, 2020
Blog
Taking the Headache Out of VPC Transitive Networking in AWS using CSR Automation
Wade Bertman
October 28, 2019
Prev
2
of
3
Next