Webinar: ✨ How Colgate-Palmolive Works Cloud Exposure Magic with Wiz & CyCognito ✨ Watch now Webinar: Wiz + CyCognito, Cloud Exposure Magic

CyCognito Blog

Your source for exposure management research, product news, and security insights.

Search the Blog

By Emma Zaballos

Networking equipment vendor Juniper Networks recently exposed current and former customer information due to a Salesforce misconfiguration. While incidents like these can give attackers valuable data and footholds into your network, leveraging exposure management best practices and processes can help organizations mitigate these risks.

Read more about The Long Tail of the Supply Chain: Leveraging Exposure Management to Mitigate Risk from Current or Former Vendors
By Rob Gurzeev

There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.

Read more about Three Approaches to External Attack Surface Management
By Emma Zaballos

Two security issues affecting the popular Ivanti Connect Secure and Ivanti Policy Secure remote access SSL VPN systems can be chained together to give unauthenticated attackers remote access to critical systems. CyCognito’s active testing protects our current customers and delivers key insights about these vulnerabilities in the CyCognito platform.

Read more about Emerging Security Issue: Ivanti Vulnerabilities CVE-2023-46805 and CVE-2024-21887
By Emma Zaballos

Cyber Monday is right around the corner and millions of consumers will flock to ecommerce websites in search of the best deals. But can shoppers be assured that the sites they do business with are secure and compliant? Before and during the holiday shopping season, retailers need to ensure that ecommerce websites with missing WAFs, cryptographic vulnerabilities, or easily exploited critical issues.

Read more about This Holiday Shopping Season, Your Attack Surface is Open for Business
By Jason Pappalexis

Achieving compliance for any sized organization is often time-consuming and stressful, forcing many security teams to divert their attention away from the tasks at hand. The value (and necessity) of achieving a successful audit efficiently cannot be understated, but the challenges are real. Using CyCognito to discover and test externally exposed assets and dynamically map issues to compliance frameworks provides the continuous visibility needed to streamline their work.

Read more about Navigating Compliance Challenges Across Your External Attack Surface