Managed Services
Penetration Testing as-a-Service
–
The evolution of penetration testing into a self service realtime assessment
Red Team-as-a-Service
–
Continuous attack surface management and testing to uncover your risk
Managed Detection & Response
–
Harness the power of automation to scale threat hunting to turn events into insights
Vulnerability Management-as-a-Service
–
Manage vulnerabilities across your entire attack surface in one view
Our Platform
Mage
–
Centralized adversary simulation detection and response platform to deliver industrialized security as-a-service
Voodoo
–
Execute astute red teaming with the power of Voodoo
Services
Penetration Testing
–
Find vulnerabilities in your networks, applications, IoT, and the cloud
Security Engineering & Architecture Services
–
Our engineers specialize in developing, implementing and operating resilient and proactive architectures
Cloud Security
–
Enterprise security assessment, consulting, engineering and monitoring for cloud systems
Federal
–
Mission critical services for the federal government
Training
Astute Cloud Red Team
–
Learn the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms
Astute Red Teaming
–
Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course
Astute Yara
–
YARA is a free, open source pattern matching tool for hunting threats, malware and other specific patterns in files
Astute Zombie Crush
–
Hands-on lab where we apply knowledge to research and develop exploits for malicious C2 servers commonly used by Black hat hackers
Resources
Thought Leadership
Blog
–
Read the latest from our leading cybersecurity engineers
Data Sheets
Product/Service Information
–
View product information about our cybersecurity services
Use Cases
Zero Trust
–
We help organizations create a comprehensive approach to zero trust security
Company
About Us
–
Our team of security experts innovate to deliver the best cybersecurity solutions
Careers
–
Make a difference by building your career in cybersecurity
Contact Us
Stage 2 Security
>
Resources
Resources
Browse our blog and download our data sheets, service descriptions, and product sheets.
Filter by
Blog
Data Sheet
EULA
Service Description
Blog
Reset Filter
Most Recent
Oldest
A to Z
Z to A
Showing 11 - 16 of 16
Blog
Navigating Splunk Docs and Answers
Ryan Adler
August 7, 2020
Blog
How to Validate Your Sigma Rules Using Sigmalint
Ryan Adler
July 25, 2020
Blog
AWS CloudTrail Logging Logic Flaw
Bryce Kunz
July 23, 2020
Blog
Anchor_dns malware goes cross platform
Waylon Grange
July 13, 2020
Blog
Taking the Headache Out of VPC Transitive Networking in AWS using CSR Automation
Wade Bertman
October 28, 2019
Blog
Fighting fire with fire, exploits against OilRig’s tool kit
Waylon Grange
May 13, 2021
Prev
2
of
2
Next