Recent spate of Aussie breaches spur huge fines to push security teams to tighten their external attack surface.
Read more about Rash of Breaches Hit Businesses in Australia Hard
Your source for exposure management research, product news, and security insights.
Recent spate of Aussie breaches spur huge fines to push security teams to tighten their external attack surface.
Read more about Rash of Breaches Hit Businesses in Australia HardWhat is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?
Read more about Study: EASM Products Boost Security While Reducing CostsA critical bug in OpenSSL versions 3.0+ dashes security team hopes that this Halloween will include treats and no tricks.
Read more about Heartbleed-like Critical OpenSSL Bug Impacts Versions 3+Threat intelligence can feel like a firehose of data to security teams who are already struggling to keep their heads above water patching, fixing and hardening networks.
Read more about Exploit Intelligence: An EASM Force MultiplierIT security teams are well aware their organizations are under constant attack. Reconnaissance scans and initial access attempts – logged nearly every day on heavily monitored web servers, SSH gateways and VPN gateways – are harsh reminders of exposure and risk.
Read more about Three Actions to Reduce External RiskDespite eradication efforts, Log4j continues to haunt large corporations eight months after the critical vulnerability was discovered.
Read more about Risky Business: Enterprises Can’t Shake Log4jRussian cyberattacks, Log4J and compliance top the list of concerns for Anne Marie Zettlemoyer, CyCognito’s new Chief Security Officer (CSO).
Read more about Three Minutes With Anne Marie Zettlemoyer, CyCognito’s CSOWe’ve seen across our customers that the typical attack surface changes by one to three percent every day.
Read more about Addressing Attack Surface Cyber Risk: An Interview with Rob Gurzeev, CEOWhile some organizations may be fine with an ASM solution that automatically bundles in pen testing, for more companies I think CyCognito, supplemented with a dedicated pen testing team, is a better solution.
Read more about BYOPT (Bring Your Own Pen Tester) A CyCognito Use Case for Pen TestingMergers and acquisitions, poorly managed web apps and insecure PII represent biggest risks tied to external attack surfaces in 2022.
Read more about Exclusive EASM Report: Mergers and Acquisitions Top 2022 External Attack Surface Management Risks