In today’s high-stakes cybersecurity landscape, one truth stands out: if you can’t see it, you can’t secure it. And if you can’t act on what you see, you’re no better off. That’s why we’re focused on delivering continuous improvements that help security teams move faster, see further, and reduce risk where it matters most.
The last month brought a range of updates to the CyCognito platform, designed to simplify operations, strengthen visibility, and support smarter and faster decisions in exposure management. Here is a quick look at what is new.
We’ve streamlined the creation of Azure cloud connectors with a single-form setup process. Now, security teams can establish connectors at the management group level with automatic permission inheritance for new child accounts (figure 1). The result? Faster onboarding, less manual effort, and reduced risk of missing cloud assets in your attack surface inventory.
Figure 1: New Azure cloud connector hierarchy choice speeds time to value
Your web application firewalls (WAFs) are only as good as their coverage. Our new WAF Protection Dashboard provides a single view of WAF products across your organization, highlights protection gaps, and helps prioritize critical areas where controls are missing (figure 2). This provides instant visibility and closes the loop on security controls coverage: a critical focus for many security leaders today.
Figure 2: Spot protected and unprotected web apps in part of the new WAF dashboard
Ever needed to investigate a domain’s history during an incident response? The new historical DNS tracking capability lets you view domain IP changes over time. This feature helps you track asset evolution and analyze potential exposure windows, supporting stronger investigations and audit readiness.
Figure 3: Historical DNS information is now included in the CyCognito asset log
We’ve sharpened how the platform determines domain ownership. Our improved discovery engine aggregates and weights low-confidence signals to deliver higher-confidence domain associations (figure 4), helping you find more of what’s truly yours, without false positives.
Figure 4. Domain discovery delivers attribution data for every asset, with zero reliance on input seeds.
Verifying issues just got easier. Our new verification guide for select issues offers step-by-step guidance (for example using a browser, cURL, Postman, etc.) to validate certain findings using CyCognito’s detection scripts. This empowers your teams to act confidently and independently, reducing friction in remediation workflows (figure 5).
Figure 5: New verification guide button provides clear steps for validation
We added columns for DMARC, SPF, and DKIM configurations in your Asset List and exports. This enhancement makes it easier to spot email security gaps that could lead to spoofing and phishing attacks.
You can now open pages in new tabs directly from the CyCognito sidebar menu, making multitasking and investigations smoother across multiple views.
These features reflect our commitment to helping security teams move beyond reactive asset management. They support a proactive exposure management strategy, one that delivers visibility, prioritization, and automation at scale, without adding complexity.
Ready to see it in action? Log in and explore the new capabilities today or contact us for a demo if you’re evaluating CyCognito as part of your exposure management journey.
Stay tuned for next month’s updates. Until then, happy securing!
Jason Pappalexis has worked in cybersecurity for nearly two decades, holding roles across government security administration, third-party testing, solutions architecture, product management, and technical product marketing.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.