Learn how new capabilities in the CyCognito platform help you completely and cost effectively operationalize attack surface protection.
Read more about Take Another Leap Beyond “Managing” Your Attack Surface
Your source for exposure management research, product news, and security insights.
Learn how new capabilities in the CyCognito platform help you completely and cost effectively operationalize attack surface protection.
Read more about Take Another Leap Beyond “Managing” Your Attack SurfaceNew Vulnerability Patch. Check your IIS servers and make sure that for those newer Windows 10 servers affected that CVE-2021-31166 has been patched.
Read more about Vulnerability Notice: Patch CVE-2021-31166When building your own cybersecurity solution in-house you can’t have coverage, cadence, and low cost. But where do you start?
Read more about Answering the Attack Surface Management “Build vs Buy” QuestionAll organizations such as Colonial Pipeline are under threat of ransomware. These attack vectors arise because they lack attack surface visibility.
Read more about Colonial Pipeline Highlights Weaknesses in Global Supply ChainDoes pen testing still make sense in an era of digital transformation where companies are reinventing themselves to be digital-first businesses?
Read more about Research Results: The Challenges With Pen Testing for CybersecurityLearn why the human-led pen test is a security tool that should be an addition to a comprehensive security testing program.
Read more about Still Required, Not Admired: Traditional Pen TestsWith the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.
Read more about Why On-Going Supply Chain Attacks Set Up an Awful Game of TelephoneNew Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.
Read more about Now Is the Time for External Attack Surface ManagementMicrosoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.
Read more about Lessons Learned from Microsoft Exchange Zero-DaysZero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.
Read more about Get Started on Zero Trust