Jim Wachhaus, a former Director of Technical Product Marketing at CyCognito, has been in technical roles on cybersecurity products for over two decades and is passionate about the discipline of cyber system defense.
Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the “Great Resignation” and the “Great Retirement.”
A timeline of how we responded to Log4j and a technical walk-through of our Active Detection Module and other steps we’ve taken .
Based on our experience responding to these issues, advice from expert CISOs, and our community of customers here are steps for a simplified response plan you can use today and for future outbreaks.
The log4j vulnerability affects code across the world. Learn how to protect your organization with the CyCognito Platform today.
CyCognito employs advanced cyber security methodologies to identify all of your assets so that your IT asset management processes are built rock solid.
When building your own cybersecurity solution in-house you can’t have coverage, cadence, and low cost. But where do you start?
All organizations such as Colonial Pipeline are under threat of ransomware. These attack vectors arise because they lack attack surface visibility.
With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.
Microsoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.
PRE-ATT&CK tactics and techniques can’t easily be addressed with traditional controls. You must look at your network the way the hackers do.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.