Product Marketing Manager
September 6, 2023
Have you ever wondered just how much the average external attack surface changes every month?
Was a Senior Product Marketing Manager at CyCognito
August 24, 2023
Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.
Was Sr. Director, Product Marketing at CyCognito
November 23, 2021
Everything that is exposed to the internet, including your security tools and appliances, must be cataloged and tested for security gaps and weaknesses.
Was Director of Technical Product Marketing at CyCognito
April 1, 2021
With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.
Was Director of Technical Product Marketing at CyCognito
March 16, 2021
Microsoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.
Was Vice President of Marketing at CyCognito
February 25, 2021
Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.
Was Director of Technical Product Marketing at CyCognito
December 17, 2020
Lessons Learned – Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.
Was Vice President of Marketing at CyCognito
September 9, 2020
Improving Vulnerability Management by Emphasizing your POV (Prioritization, Optimization, and Visibility) Vulnerability management, and the security testing that is part of it, face ever-changing demands. More aggressive attack techniques and legislative requirements alike have driven the need for: Currently, though, both large and small organizations rely on fairly standard vulnerability management processes that have stabilized over the past two decades but don’t necessarily address today’s requirements. Before we look at the mismatch between modern vulnerability management needs and today’s defacto processes, let’s take a step back and look at the steps involved in vulnerability management. Step-by-Step No matter how they…
Was Sr. Product Manager at CyCognito
July 2, 2020
Learn how the CyCognito platform proactively identifies XSS vulnerabilities and other attack vectors before attackers exploit them.
Was Vice President of Marketing at CyCognito
January 7, 2020
2020 is on target to be another banner year as we burst of the gate with being named one of the “Cybersecurity Vendors to Watch in 2020” by TechTarget.