Sr. Director of Product Marketing
February 26, 2024
CISA’s proactive approach to cybersecurity is highlighted, focusing on two directives: BOD 22-01, which mandates agencies to consult the “Known Exploited Vulnerabilities Catalog,” and BOD 23-01, aimed at improving agency asset visibility and vulnerability detection. These directives emphasize asset discovery and vulnerability enumeration as crucial activities for risk reduction. CyCognito’s platform aligns with these directives by automating discovery, contextualizing assets, and prioritizing vulnerabilities based on attacker perspective, enabling organizations to efficiently close gaps in their attack surface management.
Media Manager
November 17, 2022
What is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?
Director of Content Marketing
January 5, 2022
This year we come with a collection of predictions from a selection of experts to provide a glimpse of what is coming in 2022. The stakes have only gotten higher for businesses to protect their digital assets. What security challenges and trends are in store for 2022?
Sr. Director, Product Marketing
November 23, 2021
Everything that is exposed to the internet, including your security tools and appliances, must be cataloged and tested for security gaps and weaknesses.
Sr. Director, Product Marketing
November 18, 2021
Attack vectors are the path an attacker uses to gain access to your organization’s network. Find out more about the top attack vectors and learn to steer clear of them.
CEO & Co-Founder
August 23, 2021
Hear from Rob Gurzeev, CEO thoughts regarding EASM and why machine learning & cybersecurity protection capabilities have passed manual, human-led efforts.
Interim Head of Sales Engineering
August 6, 2021
Security ratings platforms provide a view of your security posture they – do not provide tools required to for operations nor do they reduce cyber risk.
Director of Technical Product Marketing
July 15, 2021
CyCognito employs advanced cyber security methodologies to identify all of your assets so that your IT asset management processes are built rock solid.
Vice President of Marketing
March 25, 2021
New Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.
Director of Technical Product Marketing
March 16, 2021
Microsoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.