A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing. Key findings include extensive attack surfaces due to numerous in-house and third-party applications, frequent security incidents, concerns about the effectiveness of existing tools, and inadequate testing coverage. Additionally, over half of respondents struggle to remediate discovered vulnerabilities. These findings highlight the need for improved web application security testing strategies.
CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.
The U.S. SEC recently adopted new cybersecurity disclosure rules. This post describes the new disclosure rules and the potential burdens being placed on CISOs.
Since its inauguration, CyCognito has integrated AI techniques to power the platform’s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito’s AI helps power or simplify and the various techniques it leverages.
Dive into ‘Explainability’ and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.
This GigaOm Radar report examines 22 of the leading ASM solutions in the market. It compares offerings against the key capabilities, including continuous discovery of attack surface, managing inventory of attack surface assets, identifying risks in attack surface, and false positive management. CyCognito was named a Leader and Fast Mover because of its innovative approach to asset discovery and vulnerability assessment, balanced with a solid foundation in mature platform offerings.
Benjamin Bachmann, VP of Group Information Security at Ströer, transformed the German media conglomerate’s security posture by implementing CyCognito.
CISA’s proactive approach to cybersecurity is highlighted, focusing on two directives: BOD 22-01, which mandates agencies to consult the “Known Exploited Vulnerabilities Catalog,” and BOD 23-01, aimed at improving agency asset visibility and vulnerability detection. These directives emphasize asset discovery and vulnerability enumeration as crucial activities for risk reduction. CyCognito’s platform aligns with these directives by automating discovery, contextualizing assets, and prioritizing vulnerabilities based on attacker perspective, enabling organizations to efficiently close gaps in their attack surface management.
Networking equipment vendor Juniper Networks recently exposed current and former customer information due to a Salesforce misconfiguration. While incidents like these can give attackers valuable data and footholds into your network, leveraging exposure management best practices and processes can help organizations mitigate these risks.