Webinar: Navigate the ASM Landscape with KuppingerCole’s Leadership Compass. Register now Webinar: Navigate the ASM Landscape
CyCognito Blog

Posts tagged ‘Exposure Management’

Search the Blog

By Rob Gurzeev

As manufacturing enterprises adopt digital transformation, integrating SCADA with cloud-based solutions introduces serious cybersecurity risks. This case study highlights how a Fortune 500 manufacturer inadvertently exposed SCADA systems to the internet, making them vulnerable to attacks. Traditional security tools failed to detect these exposures due to blind spots in asset inventory and reliance on predefined IP ranges. By leveraging external exposure management, the company identified and remediated these risks before exploitation. This incident underscores the need for continuous attack surface monitoring, risk-based prioritization, and automated asset discovery to secure operational technology (OT) environments against emerging threats.

Read more about Security Risks in Internet-exposed SCADA in Manufacturing
By Emma Zaballos

Savvy security leaders are moving from the legacy framework of vulnerability management to the emerging framework of exposure management. To learn more about common challenges security teams might face on their journey to exposure management, check out this report: “Vulnerability Management to Exposure Management: A Roadmap for Modernizing Your Application Attack Surface Security.”

Read more about A New Framework: Understanding Exposure Management 
By Jason Pappalexis

Exposure Management (EM), introduced by Gartner in 2022, represents the evolution or vulnerability management. With EM, security teams can address visibility and testing gaps, and stay ahead of threats. This blog includes six signs that your organization needs EM, and five essential requirements to implement it.

Read more about Six Signs that Exposure Management is Right for Your Organization
By Emma Zaballos

CyCognito just published our 2024 State of External Exposure Management Report. In this report, we looked at where serious issues hide on the average attack surface, how basic protections can help (or fail to) protect critical assets, and the ways that deprioritizing issues can help security teams spend their time on the right vulnerabilities.

Read more about Defensive Playbook: Understanding New Trends in External Risk with CyCognito’s State of External Exposure Management Report
By Brittany Busa

I recently sat down with Daniel Schlegel, the Global Chief Information Officer (CIO), Chief Security Officer, and Chief Privacy Officer of Berlitz Corporation, a global leader in language training and cultural education, to hear about their transformative experience using CyCognito to gain global external attack surface visibility, reduce costs, and enhance their security posture.

Read more about A Recent Interview Uncovers How Berlitz Corporation Reduced Critical Alerts by 86% and Saved 100K with CyCognito
By Brittany Busa

I recently sat down with Daniel Maier-Johnson, the Chief Information Security Officer (CISO), and Markus Diehm, Cybersecurity Analyst, with Asklepios Kliniken GmbH, Germany’s second-largest private healthcare provider, to hear about their experience using CyCognito to gain continuous monitoring, prioritize cyber risks, and safeguard patient information.

Read more about Recent Interview Reveals How Asklepios Kliniken GmbH Improves Risk Exposure with CyCognito
By Emma Zaballos

Networking equipment vendor Juniper Networks recently exposed current and former customer information due to a Salesforce misconfiguration. While incidents like these can give attackers valuable data and footholds into your network, leveraging exposure management best practices and processes can help organizations mitigate these risks.

Read more about The Long Tail of the Supply Chain: Leveraging Exposure Management to Mitigate Risk from Current or Former Vendors
By Jason Pappalexis

Continuous threat exposure management (CTEM) is a risk reduction strategy introduced by Gartner in 2021. Designed to significantly reduce mean time to remediation (MTTR), it relies on coordination of people, processes and technology. Choosing the right CTEM technology is critical to efficient implementation.

Read more about Continuous Threat Exposure Management – Your Path to Reduced External Cyber Security Risk