Product Manager
November 21, 2022
Automation and intelligent workflows are the cornerstones of an effective external risk management approach to cybersecurity and a surefire way to reduce mean time to remediation of vulnerabilities.
Media Manager
November 17, 2022
Recent spate of Aussie breaches spur huge fines to push security teams to tighten their external attack surface.
Sr. Technical Marketing Manager
August 15, 2022
IT security teams are well aware their organizations are under constant attack. Reconnaissance scans and initial access attempts – logged nearly every day on heavily monitored web servers, SSH gateways and VPN gateways – are harsh reminders of exposure and risk.
Hacker in Residence
June 2, 2022
While some organizations may be fine with an ASM solution that automatically bundles in pen testing, for more companies I think CyCognito, supplemented with a dedicated pen testing team, is a better solution.
Hacker in Residence
March 30, 2022
Over the years, pen tests have increasingly become a mandated component of regulatory and compliance standards. The Payment Card Industry Data Security Standard (PCI DSS) requiring pentests be performed in card data environments (CDEs) grew this need for compliance-based pen testing.
Director of Technical Product Marketing
March 24, 2022
Despite the best efforts of automation and AI, we will always need people to prevent hackers from stealing data and wreaking havoc on computer networks essential for most businesses today. In essence, a domino effect over the last two years of Covid-19 has led to the “Great Resignation” and the “Great Retirement.”
CTO and Co-Founder
March 17, 2022
Exploit Intelligence offers an end-to-end solution that prioritizes which risks to remediate immediately, before they are exploited, by proactively discovering external assets, testing vulnerabilities, and providing expert threat- plus risk-based insight.
Hacker in Residence
March 16, 2022
Equipping defenders with exploit intelligence is a way CyCognito helps defenders learn the offensive security side of things.
CEO & Co-Founder
February 24, 2022
Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface.
CEO & Co-Founder
February 24, 2022
Business risks lurk in many places. For cybersecurity, the worst risks are often the ones you never saw coming. To illustrate, consider this real example: A manufacturing conglomerate has an engineer build a Javascript connector for remote access to a mainframe but inadvertently exposes it to the internet. How do you discover this risk and its potential damage? A penetration test will not help unless you happen to be testing that particular machine among hundreds or thousands of servers. A vulnerability scan also will not help, as the risk will be invisible because it is not among the Common Vulnerabilities and…