{"id":291,"date":"2021-09-01T00:03:00","date_gmt":"2021-09-01T00:03:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=291"},"modified":"2024-08-02T13:49:17","modified_gmt":"2024-08-02T20:49:17","slug":"whats-holding-attack-surface-management-back","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/","title":{"rendered":"Security Weekly Interview: What&#8217;s Holding Attack Surface Management Back?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Attack Surface Management: What&#8217;s the mystery?<\/h2>\n\n\n\n<p>The concept of the\u00a0<a href=\"\/glossary\/attack-surface.php\" target=\"_blank\" rel=\"noreferrer noopener\">attack surface<\/a>\u00a0is almost as old as cybersecurity itself. So why do so many companies still struggle with attack surface management? Why is what should be a foundational element of any good security program so often an afterthought, if thought about at all?<\/p>\n\n\n\n<p>It\u2019s not like the challenge of protecting an organization is getting any easier. Quite the opposite: the rise of the cloud and remote work means that networks have become far more complex, with thousands or even millions of assets exposed to the internet. As a result, organizations don\u2019t know what they don\u2019t know, creating blind spots in protection that can be leveraged by attackers.<\/p>\n\n\n\n<p>The issue is that the security industry, by and large, continues to evolve incrementally, leaving it years behind other areas of the tech industry like Google and AWS, and even further behind sophisticated, ever-evolving cybercriminals. Why? Because the technology required to solve the challenge of&nbsp;<a href=\"\/learn\/attack-surface-management.php\">attack surface management&nbsp;<\/a>was until recently cost-prohibitive, in addition to being difficult to scale for most organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why attack surface monitoring needs to run across the entire infrastructure<\/h2>\n\n\n\n<p>However, that\u2019s no longer the case. In an\u00a0<a href=\"https:\/\/youtu.be\/rlEMny9Sd6w\">interview with Security Weekly<\/a>, CyCognito CEO Rob Gurzeev explains that the technology now exists to ensure effective attack surface management. It\u2019s now up to CISOs to understand the risks and adopt tools that are up to the task of properly managing the attack surface.<\/p>\n\n\n\n<p>\u201cNo combination of network port scanners, CVE scanners and the like can solve the problem,\u201d he said. \u201cYou have to leverage technologies like NLP and machine learning to automatically, at scale, find third-party components, your subsidiary\u2019s assets and the millions of assets you\u2019ve got around the world and contextualize the risk.\u201d<\/p>\n\n\n\n<p>During this wide-ranging discussion, Rob shares valuable insight into why attack surface monitoring needs to run across the entire infrastructure \u2013 not just open ports \u2013 so you can find the exploitable assets that create the greatest risk before a potential attacker gets the chance. You\u2019ll also get to hear directly from Rob about why and how the CyCognito platform was designed to take the perspective of an attacker so you can get the complete external attack surface visibility you need to prioritize risks and accelerate remediation. Click the link above to hear Rob!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an interview with SecurityWeekly, CyCognito CEO Rob Gurzeev explains that the technology now exists to ensure effective attack surface management.<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-291","post","type-post","status-publish","format-standard","hentry","category-company"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Weekly Interview: What&#039;s Holding Attack Surface Management Back? | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Weekly Interview: What&#039;s Holding Attack Surface Management Back? | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"In an interview with SecurityWeekly, CyCognito CEO Rob Gurzeev explains that the technology now exists to ensure effective attack surface management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-01T00:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T20:49:17+00:00\" \/>\n<meta name=\"author\" content=\"Lisa Bilawski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisa Bilawski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\"},\"author\":{\"name\":\"Lisa Bilawski\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/b3a934455b37af74b08a05927fb99b90\"},\"headline\":\"Security Weekly Interview: What&#8217;s Holding Attack Surface Management Back?\",\"datePublished\":\"2021-09-01T00:03:00+00:00\",\"dateModified\":\"2024-08-02T20:49:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\"},\"wordCount\":406,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\",\"name\":\"Security Weekly Interview: What's Holding Attack Surface Management Back? | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2021-09-01T00:03:00+00:00\",\"dateModified\":\"2024-08-02T20:49:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Weekly Interview: What&#8217;s Holding Attack Surface Management Back?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/b3a934455b37af74b08a05927fb99b90\",\"name\":\"Lisa Bilawski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6ff2655241306eff72ee8388ec1da3a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6ff2655241306eff72ee8388ec1da3a5?s=96&d=mm&r=g\",\"caption\":\"Lisa Bilawski\"},\"description\":\"Was Director of Content Marketing at Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/lisa-bilawski\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Weekly Interview: What's Holding Attack Surface Management Back? | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/","og_locale":"en_US","og_type":"article","og_title":"Security Weekly Interview: What's Holding Attack Surface Management Back? | CyCognito Blog","og_description":"In an interview with SecurityWeekly, CyCognito CEO Rob Gurzeev explains that the technology now exists to ensure effective attack surface management.","og_url":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/","og_site_name":"CyCognito Blog","article_published_time":"2021-09-01T00:03:00+00:00","article_modified_time":"2024-08-02T20:49:17+00:00","author":"Lisa Bilawski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lisa Bilawski","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/"},"author":{"name":"Lisa Bilawski","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/b3a934455b37af74b08a05927fb99b90"},"headline":"Security Weekly Interview: What&#8217;s Holding Attack Surface Management Back?","datePublished":"2021-09-01T00:03:00+00:00","dateModified":"2024-08-02T20:49:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/"},"wordCount":406,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/","url":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/","name":"Security Weekly Interview: What's Holding Attack Surface Management Back? | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2021-09-01T00:03:00+00:00","dateModified":"2024-08-02T20:49:17+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/whats-holding-attack-surface-management-back\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Weekly Interview: What&#8217;s Holding Attack Surface Management Back?"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/b3a934455b37af74b08a05927fb99b90","name":"Lisa Bilawski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6ff2655241306eff72ee8388ec1da3a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ff2655241306eff72ee8388ec1da3a5?s=96&d=mm&r=g","caption":"Lisa Bilawski"},"description":"Was Director of Content Marketing at Cycognito","url":"https:\/\/www.cycognito.com\/blog\/author\/lisa-bilawski\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":972,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/291\/revisions\/972"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}