Customer Marketing and Advocacy Lead
March 4, 2024
Benjamin Bachmann, VP of Group Information Security at Ströer, transformed the German media conglomerate’s security posture by implementing CyCognito.
Sr. Director of Product Marketing
February 26, 2024
CISA’s proactive approach to cybersecurity is highlighted, focusing on two directives: BOD 22-01, which mandates agencies to consult the “Known Exploited Vulnerabilities Catalog,” and BOD 23-01, aimed at improving agency asset visibility and vulnerability detection. These directives emphasize asset discovery and vulnerability enumeration as crucial activities for risk reduction. CyCognito’s platform aligns with these directives by automating discovery, contextualizing assets, and prioritizing vulnerabilities based on attacker perspective, enabling organizations to efficiently close gaps in their attack surface management.
Product Marketing Manager
February 20, 2024
Networking equipment vendor Juniper Networks recently exposed current and former customer information due to a Salesforce misconfiguration. While incidents like these can give attackers valuable data and footholds into your network, leveraging exposure management best practices and processes can help organizations mitigate these risks.
Product Marketing Manager
November 13, 2023
Generative AI is a form of artificial intelligence that generates new content –including text, images, and video – in response to user prompts. These AI models are trained on huge volumes of data and use algorithms to create content that has a similar structure to their training data
Sr. Technical Marketing Manager
October 18, 2023
Continuous threat exposure management (CTEM) is a risk reduction strategy introduced by Gartner in 2021. Designed to significantly reduce mean time to remediation (MTTR), it relies on coordination of people, processes and technology. Choosing the right CTEM technology is critical to efficient implementation.
Sr. Technical Marketing Manager
September 20, 2023
Many organizations see the value of active testing across their external attack surface but don’t have the resources to execute it. CyCognito solves five key challenges for organizations looking to reduce external attack surface risk and lower their mean time to remediation (MTTR).
Senior Product Marketing Manager
August 24, 2023
Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.
Product Marketing Manager
August 9, 2023
Vulnerability remediation is the process of identifying and neutralizing security issues affecting cyber assets. Because these issues can cause millions of dollars in lost revenue, remediation costs, or fines if they result in a data breach or damage to cyber-infrastructure, vulnerability remediation is one of the most important parts of cybersecurity.
Chief Marketing Officer
August 3, 2023
Manage the entire attack surface with external exposure management. Learn more about the key ways to safeguard your attack surface at CyCognito.
Product Manager
November 21, 2022
Automation and intelligent workflows are the cornerstones of an effective external risk management approach to cybersecurity and a surefire way to reduce mean time to remediation of vulnerabilities.