{"id":435,"date":"2019-11-19T18:03:00","date_gmt":"2019-11-19T18:03:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=435"},"modified":"2024-01-09T22:51:32","modified_gmt":"2024-01-09T22:51:32","slug":"creating-cyber-reconnaissance","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/","title":{"rendered":"How to Improve Security Posture: Create Cyber-reconnaissance"},"content":{"rendered":"\n<p>The world of security products is often self-contained in its own technological bubble. I believe that\u2019s because of some cultural issues in the security sector. Up to this point, most security tools have been created for IT and IT security teams, and they are almost entirely defensive in their function. These tools were created from the vantage point of the IT person: they\u2019re focused on the infrastructure and systems that IT people know, and they are built such that IT people are comfortable configuring them. It\u2019s a technology bubble.<br><br>But hackers don\u2019t care about the things an IT person knows about, and they don\u2019t think the way an IT person thinks. They don\u2019t really care if the pathway to their objective is within the organization\u2019s main systems, or through some inactive and forgotten asset, or through a third-party holding the organization\u2019s data. They\u2019re just looking for that easy win.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Operating Outside of the Prevailing Security Technology Bubble<\/h2>\n\n\n\n<p>For the last 30 years, organizations have been trying to defend themselves from the inside out with a \u201cguard the castle\u201d approach that\u2019s only become more fragmented and less effective with each new wave of threats and defensive tools. Organizations will never be secured solely by internal defensive strategies and tools, no matter how many they use or how great their budget.<br><br>At CyCognito, we are approaching enterprise security from an operational point of view, an entirely different perspective from the \u201cguard the castle\u201d view that shapes every other security product. Much of what we do is more closely related to mass-scale search engines and analytics engines than to security. It\u2019s a unique and inherently operational approach conducted on a massive scale that is far removed from how most security tools are developed and operate.<br><br>Instead of looking at an organization as a functional IT system, we start with an external perspective and think about an organization as a constellation of vastly distributed, often undiscovered or unmonitored targets. An organization\u2019s threat-scape is something spread across the broad expanse of the internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Hacker Doesn\u2019t Use an IT Lens<\/h2>\n\n\n\n<p>Rob Gurzeev first approached me in 2016 with the idea of evaluating an organization\u2019s attack vectors through the same sort of lens that attackers use, and I was immediately interested. Proactively, methodically and automatically discovering the sorts of exposures that attackers hope to find when probing a target was an intriguing new approach to enterprise security, and true \u201cuncharted territory\u201d. Using the latest large-scale data science techniques to analyze and prioritize those attack vectors would be a satisfying challenge to tackle. I signed on, and today CyCognito is charting a new category of solution, one that puts the power of nation-state-scale reconnaissance into the hands of security professionals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Will a Hacker Find When They Start Poking Around?<\/h2>\n\n\n\n<p>We started to think about architecting our solution based on the perspective: If you&#8217;re somewhere \u201cinside\u201d the internet and you point a flashlight in the direction of the company you\u2019re targeting, what do you see?<br><br>Similarly, the CyCognito platform looks for those first points of exposure that attackers will encounter when they set their sights on an organization. That\u2019s our unique approach.<br><br>As a commercial security offering, the CyCognito platform operates at unprecedented scale. It covers a lot of ground \u2013 the whole internet \u2013 to give customers accurate, actionable, high-quality data. Helping the world\u2019s largest companies find the far-from-obvious assets in their IT ecosystem means rigorously scouring all across the internet, identifying connections between assets that are not clearly or traditionally related. The kind of connections that, when discovered by sophisticated attackers who are poking around, provide an open conduit into the customer\u2019s data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced&nbsp;Cybersecurity Analytics&nbsp;Cut Through the Clutter<\/h2>\n\n\n\n<p>It\u2019s important to understand both how an attacker will view an intended target as well as how the business itself values its assets. This business classification or context is an integral aspect of security that security and IT people rarely discuss or effectively take into consideration.<br><br>To bring that critical element to the forefront, the CyCognito platform automatically factors in which assets and data belong to what departments within an organization, who else may have access, whether the assets are customer-facing or internal-facing, and how the processes associated with an asset work. Taken together, an organization\u2019s exposed assets and the business context of those assets form their attack surface.<br><br>To further cut through the clutter of alerts traditional solutions deliver, the\u00a0<a href=\"\/platform\/\">CyCognito platform<\/a>\u00a0also prioritizes the most urgent attack vectors where a breach would do most damage. Understanding the business context of what is exposed enables the CyCognito platform to identify what is likely to look most attractive to attackers. The platform may find thousands of attack vectors for an organization, but it will also distill those down to the 5 or 10 that an attacker would most likely pursue. This lets security teams focus on the most potentially explosive exposures.<br><br>With IT ecosystems that span the internet, preventing cyber attacks is a very large-scale problem, and it won\u2019t be met with narrow, inwardly focused legacy security solutions. Preemptively preventing attacks requires a perspective that begins outside the technology bubble, and outside the organization.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers don\u2019t think the way an IT person thinks\u2013they\u2019re looking for an easy win. Ensure your security posture by using advanced cybersecurity analytics.<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-435","post","type-post","status-publish","format-standard","hentry","category-perspectives"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Hackers don\u2019t think the way an IT person thinks\u2013they\u2019re looking for an easy win. Ensure your security posture by using advanced cybersecurity analytics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T18:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T22:51:32+00:00\" \/>\n<meta name=\"author\" content=\"Dima Potekhin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dima Potekhin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\"},\"author\":{\"name\":\"Dima Potekhin\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550\"},\"headline\":\"How to Improve Security Posture: Create Cyber-reconnaissance\",\"datePublished\":\"2019-11-19T18:03:00+00:00\",\"dateModified\":\"2024-01-09T22:51:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\"},\"wordCount\":884,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\",\"name\":\"How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2019-11-19T18:03:00+00:00\",\"dateModified\":\"2024-01-09T22:51:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Improve Security Posture: Create Cyber-reconnaissance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550\",\"name\":\"Dima Potekhin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g\",\"caption\":\"Dima Potekhin\"},\"description\":\"CTO and Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/dima-potekhin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/","og_locale":"en_US","og_type":"article","og_title":"How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog","og_description":"Hackers don\u2019t think the way an IT person thinks\u2013they\u2019re looking for an easy win. Ensure your security posture by using advanced cybersecurity analytics.","og_url":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/","og_site_name":"CyCognito Blog","article_published_time":"2019-11-19T18:03:00+00:00","article_modified_time":"2024-01-09T22:51:32+00:00","author":"Dima Potekhin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dima Potekhin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/"},"author":{"name":"Dima Potekhin","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550"},"headline":"How to Improve Security Posture: Create Cyber-reconnaissance","datePublished":"2019-11-19T18:03:00+00:00","dateModified":"2024-01-09T22:51:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/"},"wordCount":884,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/","url":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/","name":"How to Improve Security Posture: Create Cyber-reconnaissance | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2019-11-19T18:03:00+00:00","dateModified":"2024-01-09T22:51:32+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/creating-cyber-reconnaissance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Improve Security Posture: Create Cyber-reconnaissance"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550","name":"Dima Potekhin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g","caption":"Dima Potekhin"},"description":"CTO and Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/dima-potekhin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=435"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/435\/revisions"}],"predecessor-version":[{"id":597,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/435\/revisions\/597"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}