{"id":416,"date":"2019-11-19T17:45:00","date_gmt":"2019-11-19T17:45:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=416"},"modified":"2024-01-09T22:55:12","modified_gmt":"2024-01-09T22:55:12","slug":"increased-attack-surface-visibility-and-security-workflows","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/","title":{"rendered":"Platform Update: Increased Attack Surface Visibility"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">CyCognito releases next-generation of the CyCognito platform with advanced data collection, organizational data modeling and workflow management<\/h5>\n\n\n\n<h2 class=\"wp-block-heading\">Increased attack surface visibility and security workflow for greater effectiveness<\/h2>\n\n\n\n<p>Organizations are collectively spending billions of dollars on cyber security products to protect themselves, but successful breaches continue largely unabated. The CyCognito platform performs reconnaissance the way sophisticated attackers do, so you can prevent breaches by efficiently and effectively eliminating your shadow risk \u2014 the paths that attackers are likely to use to compromise your organization.<\/p>\n\n\n\n<p>CyCognito is today announcing the immediate availability of a\u00a0<a href=\"\/news\/press-releases\/cycognito-announces-next-generation-platform.php\">major release of new CyCognito platform<\/a>\u00a0capabilities, which further increases attack surface visibility and control, along with the announcement of\u00a0<a href=\"\/news\/press-releases\/cycognito-announces-next-generation-platform.php\">US$23M\u00a0<\/a>in funding. The CyCognito platform is a SaaS offering, and new capabilities are introduced in a continuous flow, but these new features are significant and represent a next-generation release of the platform.<\/p>\n\n\n\n<p>In particular, we\u2019ve made major advancements in information visualization and exploration, as well as workflow integration that will further streamline and enhance the platform\u2019s intuitive functionality.<\/p>\n\n\n\n<p>Before we explore these areas in more detail, here\u2019s a quick overview of what our unique platform offers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discovering Hundreds of Terabytes of Data: Our Botnet<\/h2>\n\n\n\n<p>The\u00a0<a href=\"\/platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyCognito platform<\/a>\u00a0automates a series of difficult processes that are at the core of discovering and eliminating \u201cshadow risk,\u201d the blind spots that are an artifact of modern IT. Specifically, the platform maps the assets in your entire attack surface, determines their business context (i.e., relevance),\u00a0<a href=\"\/learn\/attack-surface-discovery.php\">detects attack vectors,<\/a>\u00a0prioritizes those, and recommends remediation steps. The platform automates those processes so that security and risk management teams can focus on the most important risks facing their organizations &#8212; and can stop relying on legacy solutions that are simply not up to the task.\u00a0<br><br>Making it easy for CyCognito platform users to identify and eliminate their shadow risk involves assembling and organizing a lot of data extremely well, which is one of the major innovations being announced today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Organizing Hundreds of Terabytes of Data:&nbsp;Our Graph Data Model<\/h2>\n\n\n\n<p>When it comes to organizing hundreds of terabytes of data, the CyCognito platform automatically creates a graph data model, a mathematical model of your attack surface. This graph data model reflects the assets in your extended IT ecosystem, their connections to other assets, business classifications of assets, attack vectors and more. It\u2019s a complex internal structure that produces a lot of value for users, and makes it easy for you to understand what\u2019s most important to focus on right now.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Even Better Data Model Navigation and Visualization<\/h2>\n\n\n\n<p>We\u2019ve introduced three capabilities in the data model that expose more of its power to users.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1. Data Model Navigation and Visualization: We have introduced the concepts of \u201cPlatforms,\u201d \u201cBusiness Units,\u201d and \u201cEnvironments\u201d as logical groupings of assets.<\/h5>\n\n\n\n<p>Business Units reflect organizational groups most likely to own responsibility for the assets. For example, the screen capture below reflects that Remote Desktops are likely to be owned by the IT team, whereas Cisco ASAs are most likely the responsibility of the Security team. At the same time, both Remote Desktop and Cisco ASA assets fall under the Gateways and VPNs Environment classification based on their business purpose: serving as conduits for users who need to access to enterprise IT resources. Organizing assets in a way that makes them easier to understand enables security professionals to navigate their attack surface faster, more accurately, and find what they are looking for successfully.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"955\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-512x382.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-768x573.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1536x1146.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-2048x1527.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Data Model Nav &amp; Visualization Fig 1. The CyCognito platform automatically groups&nbsp;your assets by function and business ownership.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>2.&nbsp; Data Model Navigation and Visualization<\/strong><\/h5>\n\n\n\n<p>We also added a mapping that reflects the relative security \u2013 or risk level \u2013 of different sub organizations (e.g., subsidiaries), as seen below, so that organizations can understand and manage risk across the entire organization.&nbsp;<\/p>\n\n\n\n<p>ACME IT Services has a number of severe risks, as reflected by its size and color. That\u2019s a natural place for a risk or security team to turn their attention. This understanding of exposure by organization greatly increases the efficiency and effectiveness of security teams.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"737\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-1280x737.png\" alt=\"\" class=\"wp-image-421\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-1280x737.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-512x295.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-768x442.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-1536x884.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-risk-view-2048x1179.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Data Model Nav &amp; Visualization Fig 2. The organizational view in the dashboard gives you a quick view of risk levels of the different sub-organizations that impact your overall risk.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>3.&nbsp; Data Model Navigation and Visualization<\/strong><\/h5>\n\n\n\n<p>The third significant addition to the data model is the introduction of \u201cweb applications\u201d as a logical entity, which no other solution on the market offers.&nbsp;<\/p>\n\n\n\n<p>The CyCognito platform looks at the existing assets and attack vectors in your attack surface and automatically associates related application servers, databases, load balancers, etc. that form a web application and groups them together. This provides additional business context for those managing\u00a0<a href=\"\/learn\/attack-surface-discovery.php\">attack surface security<\/a>\u00a0and enables the identification of new attack vectors. This capability means that even those who aren\u2019t directly familiar with the underlying IT assets \u2013 such as new security team members or business executives &#8212; can now quickly understand when critical web applications are exposed when they shouldn\u2019t be, or are in need of further attention from security teams.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"717\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-1280x717.png\" alt=\"\" class=\"wp-image-422\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-1280x717.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-512x287.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-768x430.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-1536x861.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-asset-discovery-2048x1148.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p><strong>Data Model Nav &amp; Visualization Fig 3. The CyCognito platform automatically&nbsp;<br>discovers those assets that are associated with a web application.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Robust Workflow Integration Improvements<\/h2>\n\n\n\n<p>The second major area of new functionality in the CyCognito platform is workflow integration.<\/p>\n\n\n\n<p>CyCognito customers are eager to incorporate the platform\u2019s intelligence into business processes they already have. Integration allows you to quickly realize value from the platform, and operationalize that value in a way that helps you efficiently eliminate risk. To that end, CyCognito has introduced three significant new capabilities.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>1.&nbsp; &nbsp;Workflow Integration: Native Integration with Third Party solutions<\/strong><\/h5>\n\n\n\n<p>When you are working to remediate issues, the CyCognito platform accelerates the workflow by providing native ticketing integration with Jira and ServiceNow. The platform pre-populates all of the data related to the attack vector, including how to remediate it, delivering ticket creation at the click of a button. And, once you have remediated the issue, CyCognito automatically recognizes it has been remediated and marks the ticket as Resolved.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"953\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-1280x953.png\" alt=\"\" class=\"wp-image-423\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-1280x953.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-512x381.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-768x572.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-1536x1143.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-integration-2048x1525.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Workflow Integration Fig 1. Native integration, including with Jira and ServiceNow ticketing platforms,&nbsp;makes it easy to integrate the CyCognito platform into existing risk management workflows.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>2.&nbsp; Workflow Integration: Application Programming Interface<\/strong><\/h5>\n\n\n\n<p>Adding to our native integration with leading ticketing systems, CyCognito has introduced an application programming interface (API) so that customers can access the data that matters most to their risk prioritization and remediation efforts (see API documentation screen capture below). This modern representational state transfer (REST) API feeds your existing risk management workflows with CyCognito platform data using secure API keys and end-to-end encryption.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"835\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-1280x835.png\" alt=\"\" class=\"wp-image-424\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-1280x835.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-512x334.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-768x501.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-1536x1002.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-cycognito-api2-2048x1336.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Workflow Integration Fig 2. CyCognito provides the resources you need to use its REST API so that your&nbsp;other solutions and workflows are informed by the CyCognito platform data.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>3.&nbsp; Workflow Integration: Role Based Access Control<\/strong><\/h5>\n\n\n\n<p>The third workflow addition to the platform is role-based access control (RBAC), which provides compartmentalized access to data to optimize workflows. Subsidiaries, business units and partners can be granted selective access so that they have a view of risks in their unit, but not a view of the risks of other groups. This makes it possible for organizations with complex governance structures to seamlessly incorporate the CyCognito platform and its data into their existing workflows.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1679\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-group-login-V2.png\" alt=\"\" class=\"wp-image-425\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-group-login-V2.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-group-login-V2-366x512.png 366w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-group-login-V2-768x1075.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-group-login-V2-1098x1536.png 1098w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p>Workflow Integration Fig 3. Different groups can have their own login and&nbsp;view of their attack surface risks with the RBAC feature&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Continuous Innovation<\/h2>\n\n\n\n<p>Stay tuned to our blog for upcoming information about product innovations as CyCognito continues to pioneer and define a new category of security solutions,\u00a0Shadow Risk Elimination, working in tight partnership with customers and prospects.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyCognito maps the assets in your entire attack surface, determines relevance, detects attack vectors, prioritizes those, and gives remediation steps.<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-416","post","type-post","status-publish","format-standard","hentry","category-product"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Platform Update: Increased Attack Surface Visibility | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Platform Update: Increased Attack Surface Visibility | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"CyCognito maps the assets in your entire attack surface, determines relevance, detects attack vectors, prioritizes those, and gives remediation steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T17:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T22:55:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png\" \/>\n<meta name=\"author\" content=\"CyCognito Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyCognito Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\"},\"author\":{\"name\":\"CyCognito Staff\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91\"},\"headline\":\"Platform Update: Increased Attack Surface Visibility\",\"datePublished\":\"2019-11-19T17:45:00+00:00\",\"dateModified\":\"2024-01-09T22:55:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\"},\"wordCount\":1290,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png\",\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\",\"name\":\"Platform Update: Increased Attack Surface Visibility | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png\",\"datePublished\":\"2019-11-19T17:45:00+00:00\",\"dateModified\":\"2024-01-09T22:55:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard.png\",\"width\":2518,\"height\":1878},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform Update: Increased Attack Surface Visibility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91\",\"name\":\"CyCognito Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g\",\"caption\":\"CyCognito Staff\"},\"description\":\"Rule Your Risk\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/cycognito\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Platform Update: Increased Attack Surface Visibility | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/","og_locale":"en_US","og_type":"article","og_title":"Platform Update: Increased Attack Surface Visibility | CyCognito Blog","og_description":"CyCognito maps the assets in your entire attack surface, determines relevance, detects attack vectors, prioritizes those, and gives remediation steps.","og_url":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/","og_site_name":"CyCognito Blog","article_published_time":"2019-11-19T17:45:00+00:00","article_modified_time":"2024-01-09T22:55:12+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png","type":"","width":"","height":""}],"author":"CyCognito Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CyCognito Staff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/"},"author":{"name":"CyCognito Staff","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91"},"headline":"Platform Update: Increased Attack Surface Visibility","datePublished":"2019-11-19T17:45:00+00:00","dateModified":"2024-01-09T22:55:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/"},"wordCount":1290,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png","articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/","url":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/","name":"Platform Update: Increased Attack Surface Visibility | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard-1280x955.png","datePublished":"2019-11-19T17:45:00+00:00","dateModified":"2024-01-09T22:55:12+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/1911-CyCognito-dashboard.png","width":2518,"height":1878},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/increased-attack-surface-visibility-and-security-workflows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Platform Update: Increased Attack Surface Visibility"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91","name":"CyCognito Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g","caption":"CyCognito Staff"},"description":"Rule Your Risk","url":"https:\/\/www.cycognito.com\/blog\/author\/cycognito\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/416\/revisions"}],"predecessor-version":[{"id":603,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/416\/revisions\/603"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}