Homepage
Open in app
Sign in
Get started
Tutela by CyberSift
Discover, Protect, Preempt
Follow
CISA’s Known Exploited Vulnerabilities Catalog
CISA’s Known Exploited Vulnerabilities Catalog
TL;DR Tutela now checks detected CVEs against the CISA Known Exploited Vulnerabilities Catalog and displays this in the “Discover”…
David Vassallo
Aug 31, 2022
Tutela Windows Agent now ships with Forensics and in-built IDS
Tutela Windows Agent now ships with Forensics and in-built IDS
CyberSift continues on strengthening the Tutela offering by including two new but related features to the Windows Agent: Host Forensics and…
David Vassallo
Apr 19, 2022
Compliance checks come to windows
Compliance checks come to windows
You might already be aware of and using the Tutela Windows Agent. We are about to upgrade the Tutela windows agent to include compliance…
David Vassallo
Mar 4, 2022
Host Based Vulnerability Scanning coming out of beta
Host Based Vulnerability Scanning coming out of beta
One of Tutela’s first features was network based scanning, where a network scan would probe for open ports, attempt to determine what…
David Vassallo
May 27, 2021
Introducing Subdomain Monitoring
Introducing Subdomain Monitoring
One of the first tasks a hacker takes when attacking a target is enumeration — i.e. finding target resources that may be successfully…
David Vassallo
May 17, 2021
About Tutela by CyberSift
Latest Stories
Archive
About Medium
Terms
Privacy
Teams