Picus Security
Products & Solutions

Products

  • Threat Library
    The global threat landscape at your fingertips
  • Mitigation Library
    Industry-wide knowledgebase of threat mitigation products
  • Threat Emulation
    Noise-free architecture with advanced reporting
  • Detection Analytics
    Automated and threat-centric analytics for SOCs

Solutions

  • Detection Analytics & Mitigation
    Uplift your SOC capabilities
  • Security Control Validation & Mitigation
    Elevate your prevention capabilities

Use Cases

  • Offensive Security
  • Security Operations Center
  • IT Operations & SecOps
  • Security Leadership

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Company
Partners

Partner Program

  • About the Partner Program
  • Become a Picus Partner
  • Partner Portal

Technology Alliances

  • Network Intrusion & Web Application Firewall
  • Endpoint Detection & Response
  • Security Information & Event Management

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Resources

Six Stages of Dealing with a Global Security Incident

Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach

  • View all Resources
  • Blog
  • Webinars
  • Reports & Guides

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Request a Demo

Resources

Featured

The Red Report

    Filter:

    Emotet Technical Analysis - Part 2 PowerShell Unveiled

    Article

    Breach and Attack Simulation: A Novel Cyber-Security Validation Approach

    Reports

    Emotet Technical Analysis - Part 1 Reveal the Evil Code

    Article

    A brief history and further technical analysis of Sodinokibi Ransomware

    Article

    Cyber Crime Turns Cyber Racket - Tackling Ransomware Before It Hits

    Article

    Picus recognized as a Cool Vendor 2H19 in Security and Risk Management by Gartner

    Article

    Vulnerability Scanning, Pentesting, Red Teaming … What’s Next?

    Article

    Red or Blue Pill – MITRE's Impact On The Infosec Industry

    Article

    The Ransomware Resurgence Led By LockerGoga

    Article

    The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc

    Article

    Cybersecurity Exists Until You’re Breached, Part 1

    Article

    High-Risk Cryptolocker Ransomware Disguised as Turkcell Invoice

    Article

    Prev 1 2 3 4 5 Next
    Picus Security

    San Francisco

    1355 Market St. #488,
    San Francisco, CA 94103 USA 

    +1 (415) 8905105

    London

    Farnborough, Orpington,
    BR6 7BX, UK

    +44 (1689) 857598

    Ankara

    Hacettepe Teknokent, AR-GE 1,
    No: 12 06800 - Çankaya Ankara, TR

    +90 (312) 2353579

    Email

    info@picussecurity.com

    Products

    • Threat Library
    • Mitigation Library
    • Threat Emulation
    • Detection Analytics

    Solutions

    • Security Control Validation & Mitigation
    • Detection Analytics & Mitigation

    Use Cases

    • Offensive Security
    • Security Operations Center
    • IT & Security Operations
    • Security Leadership

    Resources

    • Reports & Guides
    • Webinars
    • Newsletter
    •  

    Partners

    • Technical Alliances
    • Partner Program

    Company

    • About
    • Leadership
    • Careers
    • Contact
    Follow us on LinkedIn Follow us on Twitter Follow us on Facebook
    © 2021 Copyright. All rights reserved.
    Privacy