Die Frist für NIS 2 endet im Oktober 2024: Auch wenn es in vielen Mitgliedsstaaten noch länger dauert, bis diese Direktive in lokale Gesetze gegossen sein wird, beginnen doch schon viele betroffene Unternehmen mit der Planung bzw. Umsetzung der für sie passenden Maßnahmen. CyCognitos umfassende External Attack Surface Risk Management Plattform kann die Umsetzung wichtiger Bestandteile der NIS 2 Richtlinie beschleunigen.. Dieser Blog ist eine passende Lektüre für alle, die sich mit dem Verständnis der NIS 2-Anforderungen und der Suche nach dem schnellsten Weg zur Erfüllung dieser Anforderungen beschäftigen.
This blog post discusses a recent software supply chain attack that targeted the popular JavaScript service, Polyfill.io. The attack highlights the importance of software supply chain security and provides how CyCognito can help identify third-party libraries to mitigate exposed vulnerabilities.
Since its inauguration, CyCognito has integrated AI techniques to power the platform’s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito’s AI helps power or simplify and the various techniques it leverages.
Dive into ‘Explainability’ and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.
There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.
Axonius and CyCognito, working together, provide a broad picture of risk based on internal and external intelligence allowing mutual customers to efficiently prioritize threats based on their potential for real-world exposure.
An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito’s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.
CyCognito Attack Surface Management (ASM) now offers the ability to discover APIs on an organization’s attack surface. Given the proliferation of APIs and their attractiveness to attackers, this capability is an important new tool for security teams. This post describes the issue and how CyCognito ASM solves it.