{"id":381,"date":"2020-07-23T23:28:00","date_gmt":"2020-07-23T23:28:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=381"},"modified":"2024-08-02T14:49:46","modified_gmt":"2024-08-02T21:49:46","slug":"find-the-path-of-least-resistance-into-your-organization-before-attackers-do","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/","title":{"rendered":"Our Mission is Making Sure Cyber Attackers Fail Theirs"},"content":{"rendered":"\n<p>We\u2019re excited to&nbsp;<a href=\"\/news\/press-releases\/cycognito-raises-30-million-in-series-b-funding.php\">announce our Series B funding<\/a>&nbsp;today because it helps us advance our mission to give organizations an advantage over cybersecurity attackers who generally have the upper hand.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attackers Have the Upper Hand<\/h2>\n\n\n\n<p>Fundamentally, there\u2019s an inherent inequity in the structure of the \u201csecurity game.\u201d Defenders have to protect the entire playing field (i.e., their attack surface) and always be successful, even as its boundaries constantly change. But attackers only have to execute one clever move to break through and be victorious.&nbsp;<\/p>\n\n\n\n<p>Further, attackers understand how security teams work, the limitations of enterprise security tools and the assumptions security experts are making in their lines of defense. They know exactly where their opponents will double-down on defense and where they will forget to look. Without breaking a sweat, attackers identify the externally-exposed systems and assets that are mostly overlooked by organizations and use them as an easy path \u2014 a path of least resistance \u2014 into the enterprise.<\/p>\n\n\n\n<p>For the enterprise to gain the upper hand when protecting their IT ecosystem, they must apply some of the same techniques that attackers use. And that\u2019s where CyCognito comes in.&nbsp;<a href=\"\/blog\/news-release-beating-attackers-at-their-own-game-by-building-a-nation-state-grade-reconnaissance-platform\/\">From the outset<\/a>, my co-founder Dima Potekhin and I knew from our national intelligence agency roots that attackers easily succeed when security teams have visibility gaps that they are unable to map and leave unprotected. These assets often pose significant business risk in themselves or provide a conduit to other more valuable assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exposed Assets Put Business Relationships at Risk<\/h2>\n\n\n\n<p>It\u2019s not uncommon to see forgotten and unprotected sensitive business assets on internal networks, in the cloud, and on partner or\u00a0subsidiary networks\u00a0become the first point of an attack. Attacks on those exposed elements can quickly spiral into a nightmare situation because they often include pathways to payment mechanisms that can expose customer credit card data, DevOps components that allow access to source code and keys, intellectual property, and third-party gateways that can provide access to internal networks. Once those exposed assets are breached, they put business stability and important relationships at risk.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"449\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\" alt=\"\" class=\"wp-image-383\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg 860w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1-512x267.jpg 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1-768x401.jpg 768w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n\n\n\n<p>To prevent this and allow security teams to understand what\u2019s exposed and help them identify and prioritize these paths of least resistance, we have committed ourselves to developing a first-of-its-kind platform that delivers large-scale automation of the whole reconnaissance process, a process that can take an attacker weeks, if not months, to run per organization.<\/p>\n\n\n\n<p><a href=\"\/learn\/attack-surface-management.php\">Attack surface management&nbsp;<\/a>as a category of products has gained attention in the market, from security experts, industry analysts and customers. Most of this practice has been focused on the known attack surface, and only on discovery but not security testing.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers succeed when security teams have visibility gaps that they are unable to map. These paths of least resistance are the easy way in.<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[6,9],"class_list":["post-381","post","type-post","status-publish","format-standard","hentry","category-company","tag-attack-surface-management","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Attackers succeed when security teams have visibility gaps that they are unable to map. These paths of least resistance are the easy way in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-23T23:28:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T21:49:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\" \/>\n<meta name=\"author\" content=\"Rob Gurzeev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Gurzeev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\"},\"author\":{\"name\":\"Rob Gurzeev\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\"},\"headline\":\"Our Mission is Making Sure Cyber Attackers Fail Theirs\",\"datePublished\":\"2020-07-23T23:28:00+00:00\",\"dateModified\":\"2024-08-02T21:49:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\"},\"wordCount\":459,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\",\"keywords\":[\"Attack Surface Management\",\"Cybersecurity\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\",\"name\":\"Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\",\"datePublished\":\"2020-07-23T23:28:00+00:00\",\"dateModified\":\"2024-08-02T21:49:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg\",\"width\":860,\"height\":449},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Mission is Making Sure Cyber Attackers Fail Theirs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\",\"name\":\"Rob Gurzeev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"caption\":\"Rob Gurzeev\"},\"description\":\"CEO &amp; Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/","og_locale":"en_US","og_type":"article","og_title":"Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog","og_description":"Attackers succeed when security teams have visibility gaps that they are unable to map. These paths of least resistance are the easy way in.","og_url":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/","og_site_name":"CyCognito Blog","article_published_time":"2020-07-23T23:28:00+00:00","article_modified_time":"2024-08-02T21:49:46+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg","type":"","width":"","height":""}],"author":"Rob Gurzeev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rob Gurzeev","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/"},"author":{"name":"Rob Gurzeev","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679"},"headline":"Our Mission is Making Sure Cyber Attackers Fail Theirs","datePublished":"2020-07-23T23:28:00+00:00","dateModified":"2024-08-02T21:49:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/"},"wordCount":459,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg","keywords":["Attack Surface Management","Cybersecurity"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/","url":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/","name":"Our Mission is Making Sure Cyber Attackers Fail Theirs | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg","datePublished":"2020-07-23T23:28:00+00:00","dateModified":"2024-08-02T21:49:46+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LI-Ad-SG-Merger-and-Acquisition-1.jpg","width":860,"height":449},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/find-the-path-of-least-resistance-into-your-organization-before-attackers-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Our Mission is Making Sure Cyber Attackers Fail Theirs"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679","name":"Rob Gurzeev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","caption":"Rob Gurzeev"},"description":"CEO &amp; Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=381"}],"version-history":[{"count":7,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions"}],"predecessor-version":[{"id":1032,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions\/1032"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}