💡 Webinar: How Siemens Healthineers Operationalizes CTEM at Scale Register Now 💡 Webinar: How Siemens Healthineers Operationalizes CTEM
CyCognito Blog

Posts tagged ‘Discovery’

Search the Blog

By Tim Matthews ・

Since its inauguration, CyCognito has integrated AI techniques to power the platform’s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito’s AI helps power or simplify and the various techniques it leverages.

Read more about AI at CyCognito
By Jason Pappalexis ・

An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito’s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.

Read more about Discovery: Don’t Let the Wrong Definition Impact Your Risk Exposure
By Aviel Tzarfaty ・

Web Application Firewalls (WAFs) are the most common protection for web applications. WAFs protect web applications by filtering and monitoring HTTP traffic between the application and the internet. However, WAFs need to be deployed and configured to protect web applications specifically. If they are not, this leaves open a potential route for an attacker.

Read more about How to Ensure WAF Coverage Using CyCognito