
Resources
Top 10 Challenges for Insider Threat Research and Practice
Dr. Frank Greitzer outlines the challenges with insider threat research and the establishment of comprehensive counter insider threat programs.
VideoTracking Supershell with TacitRed
Supershell is a c2 infrastructure run on webservers to provide a user interface to facilitate remote connections. We observed this c2 being used to set up back doors on targets in this campaign.
BlogCogility Launches TacitRed Closed Beta
Cogility announces the official start of the TacitRed Closed Beta program.
BlogComplex Event Processing As a Behavioral Analytic
Learn how complex event processing, or CEP, processes real-time events and extracts information from event streams as they arrive.
White PaperCogynt – Continuous Intelligence Explained
Learn how Cogynt reduces the uncertainty of decision-making in time sensitive, highly complex environments.
White PaperCogynt – A Comprehensive Solution to Insider Threats
Learn how Cogynt takes on insider threats with continuous intelligence.
White PaperAndrew Davis joins Cogility as Head of Product
The Cogility team is pleased to announce that Andrew Davis has joined as Cogynt's Head of Product.
BlogCogynt – A Continuous Intelligence Platform
Learn how Cogynt empowers Chief Risk Officers and Intelligence Analysts alike with continuous intelligence.
White PaperJeremy Turner joins Cogility as an Advisor
The Cogility team is pleased to announce that Jeremy Turner has joined as an Advisor.
BlogCogynt: Flink without code — Samantha Chan
In our data-driven world, the need for speed has never been greater.
Video