attack surface management
blog-banner-mobile

CyCognito Blog

The Great Resignation Isn't Going Away. Here's How to Retain Your Cybersecurity Employees.

By Jim Wachhaus | March 24, 2022
Demand for information security professionals is undoubtedly very high. Cyberattacks and ransomware seem to be in the news daily, and no...
Read More

Exploit Intelligence: It's Not Just for Offensive Security Pros Anymore

By Phillip Wylie | March 16, 2022
My cybersecurity career spans a little over 18 years with over half spent in offensive security, working as a pentester and red team...
Read More

CyCognito’s 2022 Cyber Security Predictions

By Lisa Bilawski, Director of Content Marketing | January 11, 2022
Once again, the season of cyber security predictions is back upon us. This year we come with a collection of predictions from a selection...
Read More

When your security tools introduce security weaknesses

By Sam Curcuruto | November 23, 2021
On the heels of another zero-day vulnerability found in a security tool, we’ve been working with our customers to show them whether or not...
Read More

Top attack vectors and how to prevent them

By Sam Curcuruto | November 18, 2021
Ransomware, supply chain disruption, social engineering leading to credential theft—cyber attacks seem to be disrupting businesses and...
Read More

Never Let a Security Analyst Do a Machine’s Job - TCO calculator

By Jim Wachhaus | September 29, 2021
You know you need to look at your attack surface the way attackers do and invest in external attack surface management (EASM), right? ...
Read More