Skip to content
  • About
Grayzone Security

Grayzone Security

Applied Research

Dendrite Technologies Logo

New Venture: Dendrite Technologies

Posted on February 4, 2026May 11, 2026 By Tyler G.

If you’re following my newer X account (https://x.com/TG01_Actual) then you may have seen my post on August 15, 2025 about resigning from my role with Edgile LLC (now a Wipro owned company) to self-fund a new startup:

Today was a big day: I resigned (2-weeks notice) from my role as a Principal Security/Infrastructure Architect to finish developing a series of projects, which I think might have legs as an #artificalintelligence & #MachineLearning enabled #ThreatIntel platform. Depending on how…

— Tyler (@TG01_Actual) August 16, 2025

Since this post, I’ve made majors strides in research, design and development of the project, now close to 98% of the core technologies (including MVP of the automated malware analysis ecosystem) and the majority of the web platform which will serve are one of the methods of data delivery.

Assuming that there are no problems with the hardware that I’ve ordered for a 2U server build (destined for a local colo) and deployment from my local dev environment to the cloud goes well, we are just weeks from offering the public release of Dendrite Technologies!

Testing & Sentiment

As you can read in the intro to Dendrite blog post, I hosted several rounds of beta-testing in Q4 of 2025, where I invited a group of interdisciplinary SMEs to test their use cases against a scaled ‘demo series’ of our data – which included professional from SOC, Cyber Threat Intelligence, Threat Hunter, Malware Campaign Researchers, Government and LEA backgrounds. Though this data set featured less than 15% of our planned go-live scale, testers of were unanimous in their opinion that the breadth and depth of Dendrite’s data and automated link analysis had massively expedited their workflow, while drastically lowering the skill and experience barrier to producing and/or using actionable intelligence.

Across a smaller group, the same was demonstrated when we asked the junior team members to work outside of their subject matter and perform the roles which produce data they consume in their daily work. In example: Can a junior Threat Hunter or SOC analyst perform the proactive functions of a CTI professional? In all cases, the junior team members performed roles outside of their subject matter at or above the level of mid to experienced analysts.

Going Forward

As you can imagine: this has, is currently and will in the future, occupy a lot of my focus, as I’ve accepted significant financial risk to make this project happen. Because of this and for the time being, 100% of my upcoming blog articles on research, will be published directly to the company site. Here, myself Dendrite staff will focus on observations in the industry, perform medium-to-low level analysis and update views with recent news from the company. I hope that you will join us there, on LinkedIn and X.

AI, LLM, Machine Learning, OSINT, Privacy, Security Tags:AI, Hybrid Cloud, Machine Learning, OSINT, Security

Post navigation

Previous Post: Deploying Locally Trained LLM & ML Assets to Azure

Recent Posts

  • New Venture: Dendrite Technologies
  • Deploying Locally Trained LLM & ML Assets to Azure
  • Indigo LLM – The RAG & ETL
  • Indigo LLM
  • The Big Data SIEM: Storage in Azure

Categories

  • AI
  • Azure
  • Case Study
  • Cloud
  • Docker
  • Linux
  • LLM
  • Machine Learning
  • OSINT
  • Privacy
  • Security
  • Training Review
  • Tutorial
  • Walkthroughs

Subscribe

Subscribe for email updates on new content. There will be one email every-other week, if new posts were added:

  • LinkedIn
  • GitHub
  • X

Copyright © 2026 Grayzone Security.

Powered by PressBook Dark WordPress theme