Raphael Reich, a former Vice President of Marketing at CyCognito, has helped bring innovative, category-defining security products to market for over two decades.
We’ve set out to change the way the world understands what attack surface management could be, and we’re doing that through our new platform approach.
Does pen testing still make sense in an era of digital transformation where companies are reinventing themselves to be digital-first businesses?
New Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.
Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.
The SolarWinds attack (SUNBURST) demonstrates that hackers will find weakness in your extended IT ecosystem that you simply just don’t know about.
Attackers generally operate with business-like discipline as evident in the FireEye data breach—presumably for political purposes rather financial gain.
Improving Vulnerability Management by Emphasizing your POV (Prioritization, Optimization, and Visibility) Vulnerability management, and the security testing that is part of it, face ever-changing demands. More aggressive attack techniques and legislative requirements alike have driven the need for: Currently, though, both large and small organizations rely on fairly standard vulnerability management processes that have stabilized over the past two decades but don’t necessarily address today’s requirements. Before we look at the mismatch between modern vulnerability management needs and today’s defacto processes, let’s take a step back and look at the steps involved in vulnerability management. Step-by-Step No matter how they…
Here are some news ways to manage the digital risk that comes along with your expanding business presence due to digital transformation.
2020 is on target to be another banner year as we burst of the gate with being named one of the “Cybersecurity Vendors to Watch in 2020” by TechTarget.
The term “attack surface” is sometimes defined as different ways an organization can be breached. But that is really just the sum of your attack vectors.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.