attack surface management
blog-banner-mobile

CyCognito Blog

When your security tools introduce security weaknesses

By Sam Curcuruto | November 23, 2021
On the heels of another zero-day vulnerability found in a security tool, we’ve been working with our customers to show them whether or...
Read More

Top attack vectors and how to prevent them

By Sam Curcuruto | November 18, 2021
Ransomware, supply chain disruption, social engineering leading to credential theft—cyber attacks seem to be disrupting businesses and...
Read More

Never Let a Security Analyst Do a Machine’s Job - TCO calculator

By Jim Wachhaus | September 29, 2021
You know you need to look at your attack surface the way attackers do and invest in external attack surface management (EASM), right? ...
Read More

The State of External Attack Surface Management (EASM)

By Rob Gurzeev, CEO and Co-Founder of CyCognito | August 23, 2021
When Dima and I co-founded CyCognito four years ago, our goal was simple: change the attacker/defender dynamic by proactively giving...
Read More

The Truth About How Security Ratings Work

By Graham Rance, Director of Sales Engineering EMEA, CyCognito | August 6, 2021
Just like a personal credit rating, security ratings platforms are designed to take a high-level, permissionless view of an organisation...
Read More

Full or Foolish Disclosure: 5 Parts of Good Breach Disclosure

By Jim Wachhaus | July 15, 2021
I think it’s safe to say that everyone, except of course bad actors, will agree that it’s always best to avoid a security breach. ...
Read More