Product Marketing Manager
September 6, 2023
Have you ever wondered just how much the average external attack surface changes every month?
Senior Product Marketing Manager
August 24, 2023
Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.
Sr. Director, Product Marketing
November 23, 2021
Everything that is exposed to the internet, including your security tools and appliances, must be cataloged and tested for security gaps and weaknesses.
Director of Technical Product Marketing
April 1, 2021
With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.
Director of Technical Product Marketing
March 16, 2021
Microsoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.
Vice President of Marketing
February 25, 2021
Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.
Director of Technical Product Marketing
December 17, 2020
Lessons Learned – Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.
Vice President of Marketing
September 9, 2020
Improving Vulnerability Management by Emphasizing your POV (Prioritization, Optimization, and Visibility) Vulnerability management, and the security testing that is part of it, face ever-changing demands. More aggressive attack techniques and legislative requirements alike have driven the need for: Currently, though, both large and small organizations rely on fairly standard vulnerability management processes that have stabilized over the past two decades but don’t necessarily address today’s requirements. Before we look at the mismatch between modern vulnerability management needs and today’s defacto processes, let’s take a step back and look at the steps involved in vulnerability management. Step-by-Step No matter how they…
Sr. Product Manager
July 2, 2020
Learn how the CyCognito platform proactively identifies XSS vulnerabilities and other attack vectors before attackers exploit them.
Vice President of Marketing
January 7, 2020
2020 is on target to be another banner year as we burst of the gate with being named one of the “Cybersecurity Vendors to Watch in 2020” by TechTarget.