Security teams need automation, clarity, and speed to stay ahead. This month’s updates continue to refine the CyCognito experience so you can maintain an accurate asset inventory, pivot through investigations quickly, and share the right information with stakeholders.
In the past few weeks we delivered improvements across automation (including Action Rules), APIs improvements, new investigation and management options, and reporting controls for PDFs. Below is a detailed look at what is new.
Action Rules now streamline routine asset hygiene by executing actions automatically when your conditions are met. Using Action Rules you can create custom policies that will save you time by automatically managing attribution, applying or removing tags, remove assets when predefined filters conditions and more.
The result is an inventory that stays organized and aligned to policy with less manual effort, so your team can focus on higher-value work.
We have extended API coverage for the unified Asset List so you can query and retrieve all asset types through a single endpoint. This makes it possible to run CyQL queries across multiple asset classes and receive consolidated results in one call, simplifying orchestration in scripts and pipelines.
In addition, we also added a new endpoint that enables removal of multiple assets in one operation. Submit a bulk request with asset identifiers to accelerate inclusion and exclusion workflows during cleanups, audits, or M&A transitions. Large-scale actions become repeatable and fast.
Visit our API documentation to learn more
We have introduced a new filtering capability that allows users to filter assets by their cloud environment provider.
The filter is available as CLOUD PROVIDER in the basic filters and as cloud_env_provider
in CyQL, making it easier to manage and monitor cloud infrastructure assets. This equips users with more precise control and improves the overall cloud asset management experience.
The Confidence level is a unique metric in our platform that measures the likelihood an issue is both real and exploitable, helping reduce false positives with over 90% accuracy. To make it even more actionable, the latest update introduces standardized enums aligned with numeric ranges:
This makes triage faster and more intuitive. Confidence values now appear consistently across the platform, including issue lists and details, filters, advanced search, the API, CSV exports, and PDF reports, so prioritization stays aligned regardless of where you work.
We have added clickable ‘Affected assets’ counts in the Issue Catalog that take you directly to the Issue List with the corresponding filter already applied. This lets you move from a high-level issue view to detailed analysis in a single step (less time recreating searches, more time resolving issues).
You can configure exported PDF reports (issues and assets) to exclude the discovery path section when it is not relevant for the recipients. This is especially useful for organizations managing multiple unrelated entities.
Exported PDF reports can now include attribution propagation paths for assets and issues, providing a clear view of how assets are attributed to your organizations.
CyCognito customers: To enable these reporting options for your organization, please contact [email protected].
These updates are built to reduce manual effort and improve decision speed in exposure management (with ASM as a core pillar). They help you maintain a clean asset inventory, move through investigations efficiently, and present the right context to stakeholders without extra work.
Ready to see it in action? Log in and explore the new capabilities today or contact us for a demo if you’re evaluating CyCognito as part of your exposure management journey.
Igal Zeifman has worked in cybersecurity and cloud for over two decades, leading strategic, full-funnel marketing efforts at both startups and global enterprises. He has held senior marketing roles at several application and endpoint security companies, contributing at pivotal stages of growth as well as to security research and product initiatives that shaped market perception and adoption.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.