{"id":48,"date":"2023-11-27T08:50:00","date_gmt":"2023-11-27T08:50:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=48"},"modified":"2025-06-19T09:10:10","modified_gmt":"2025-06-19T16:10:10","slug":"discovery-dont-let-the-wrong-definition-impact-your-risk-exposure","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/","title":{"rendered":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure"},"content":{"rendered":"\n<p>For <a href=\"\/external-attack-surface-management\/\">external attack surface management<\/a> (EASM) technologies, the word \u201cdiscovery\u201d has as many shades of gray as there are crayons in a crayon box.\u00a0<\/p>\n\n\n\n<p>An accurate external asset inventory is a top priority for organizations reducing risk. Performed well, discovery provides visibility into a business\u2019s entire IT ecosystem of interconnected external assets. Performed poorly and discovery leads to a ripple effect of uncertainty, risk gaps, and wasted effort.<\/p>\n\n\n\n<p>Since defined in 2021 by Gartner, EASM has&nbsp;<a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US49126122\">experienced rapid growth<\/a>, as much as 31% between 2021 and 2022, leaving many competing technologies claiming a piece of the asset discovery pie. Each vendor has their own definition, but not all lead to the same results.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is CyCognito\u2019s definition of Discovery?<\/h2>\n\n\n\n<p>At its most fundamental, \u201cdiscovery\u201d refers to the uncovering of the entire list of externally exposed digital assets (IP addresses and web applications, for example) owned by an organization.<\/p>\n\n\n\n<p>It then gets murky for many technologies. Spotting a single new asset in a known IP address range&nbsp;<em>is&nbsp;<\/em>discovery, but it also isn\u2019t the use case that is needed (and expected) by IT security teams.&nbsp;<\/p>\n\n\n\n<p>Nor is it CyCognito\u2019s definition. What about assets within currently unknown IP address ranges, the ones tied to different divisions within your organization? What about assets within subsidiaries? What about discovering business context and evidence? Cloud assets? Everything is part of the definition and must be included.<\/p>\n\n\n\n<p>The right definition of discovery includes three elements: organizational discovery (to understand where to look), asset discovery (to do the finding), and context discovery (to uncover meaningful details). To summarize:<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Discovery \u2260 Asset Discovery<\/h5>\n\n\n\n<h5 class=\"wp-block-heading\">Discovery = Organization Discovery + Asset Discovery + Context Discovery<\/h5>\n\n\n\n<p>With discovery, automation is critically important. The owner of an asset discovery tool doesn\u2019t necessarily know or have access to the correct inputs to search for assets within all corners of your IT ecosystem. And since the external attack surface is continuously changing (on average 10.3% per month, from&nbsp;<a href=\"\/resources\/reports\/cycognito-state-of-external-exposure-management\/\">CyCognito State of External Exposure<\/a>&nbsp;research), this issue never goes away.<\/p>\n\n\n\n<p>Let&#8217;s look at each element in more detail.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">First: organizational reconnaissance<\/h2>\n\n\n\n<p>An automated, organic search workflow that starts with organizational reconnaissance builds the highest accuracy external asset inventory and richest context fidelity.<\/p>\n\n\n\n<p>An EASM must have a way of viewing an organization from the eyes of someone unfamiliar with it AND who has the goal to break into it. This is how an attacker finds the forgotten, unmanaged systems that lead to a breach and what your EASM must also do to beat cybercriminals at their own game.<\/p>\n\n\n\n<p>Organizational reconnaissance isn\u2019t easy to automate, but doing so is imperative if it is to be performed consistently and continuously. Like an attacker, the system needs to be able to read periodicals, SEC filings, Wikipedia, Crunchbase, press releases, Google search results, and much more to understand the scope of an organizational business structure. Did your Germany division just merge with a small supplier and now own all its assets? Attackers know this may be a way into the parent company and will capitalize on it. Often the only way you would know about it is by reading a press release, which is not something IT Security teams commonly have time to do.<\/p>\n\n\n\n<p>CyCognito starts with a \u201czero knowledge\u201d approach. Using machine learning (ML) and natural language processing (NLP) technologies CyCognito scrapes web pages, reads PDFs, and more, building a continuously updated graph data model that represents your organization\u2019s attack surface. Figure 1 illustrates this attack surface discovery approach that leaves no stone unturned and requires no effort from your IT security teams.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"410\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png\" alt=\"\" class=\"wp-image-58\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png 1024w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-500x200.png 500w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-768x307.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1536x614.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 1. Organizational reconnaissance with CyCognito<\/em><\/p>\n\n\n\n<p>Want to see more about the decision? Every discovery choice includes what CyCognito calls a \u201chypothesis,\u201d which is a level of confidence in the chosen relationship and includes the supporting evidence for the claim.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Second: asset discovery<\/h2>\n\n\n\n<p>Nearly all EASM products on the market today require seed information to begin, forcing the IT security team to manually enter IP ranges and domain names for the product to scan. It goes without saying that the list of domains and IP ranges must be continuously assessed and adjusted to ensure accuracy. Miss an IP range from a division you didn\u2019t know existed? It just takes one unmanaged asset with an exposure to provide a foothold into your network.<\/p>\n\n\n\n<p>CyCognito\u2019s asset discovery engine is natively integrated with its organizational reconnaissance engine. Once the organization is mapped, CyCognito then uses what it calls propagated discovery &#8211; each asset is used as a seed to discover new adjacent assets. These new adjacent assets are used to find more assets, and so on. In this way, CyCognito finds even the most obscure assets without human input or effort.<\/p>\n\n\n\n<p>Cloud assets are as important. The CyCognito cloud connector provides the most responsive view of often difficult-to-track ephemeral assets that reside in cloud service provider (CSP) infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">And third: context discovery<\/h2>\n\n\n\n<p>Without context, the discovery process is incomplete. CyCognito discovery includes understanding what an asset is, where it exists in the network, its primary purpose, and more.&nbsp;<\/p>\n\n\n\n<p>CyCognito automatically uncovers meaningful, accurate context that IT Security teams can do something with. This context is used to make prioritization decisions and build accurate test payloads. Examples of context include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unique metadata:<\/strong>&nbsp;Business context, attractiveness to attackers, discoverability, PII collection, related applications<\/li>\n\n\n\n<li><strong>Assets:<\/strong>&nbsp;Domains, sub-domains, servers, devices, web applications, products, services, certificates, exposed internal business applications, DevOps instances<\/li>\n\n\n\n<li><strong>Technical context:&nbsp;<\/strong>Evidence of state, location in the network, DNS resolve evidence<\/li>\n\n\n\n<li><strong>Organizational structure:&nbsp;<\/strong>Organizations, subsidiaries, business units<\/li>\n<\/ul>\n\n\n\n<p>Automated context discovery is essential to maintain pace with change. Having to loop back to find context manually is unscalable for anything but perhaps the smallest external attack surface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let&#8217;s look at a Discovery example<\/h2>\n\n\n\n<p>CyCognito discovery ends with assets but begins with the organizational business structure. Organizations must be treated as unknown, just like assets, and be continuously re-evaluated in order to adjust to change.<\/p>\n\n\n\n<p>Figure 1 illustrates an automatically built organizational chart, in this case for a fictitious Acme Corporation. Fully dynamic, users quickly see each division and understand issue count, asset count, and risk score.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-2-1024x532.png\" alt=\"\" class=\"wp-image-57\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-2-1024x532.png 1024w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-2-500x260.png 500w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-2-768x399.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-2.png 1254w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 2. Business Structure for Acme Organization<\/em><\/p>\n\n\n\n<p>Acme Homes has a security score of \u201cD\u201d, let&#8217;s see why. Clicking leads us to the assets owned by the Acme Homes business, as shown in Figure 2. These may be assets housed on partner or third-party sites, workloads running in public cloud environments, abandoned or deprecated websites, file shares, IoT devices, and services enabled by shadow IT.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1-1024x582.png\" alt=\"\" class=\"wp-image-56\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1-1024x582.png 1024w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1-500x284.png 500w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1-768x436.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1.png 1311w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 3. List of Assets owned by Acme Homes, a division of Acme Organization<\/em><\/p>\n\n\n\n<p>Let&#8217;s click on an asset to understand more. Figure 3 presents the asset view, which includes all context, test information, issue lists, and a risk overview.<\/p>\n\n\n\n<p>Immediately we can see the asset has forty severe issues out of 285 total. Seven issues are marked critical. Asset attractiveness is high due to the number of issues and asset type, but thankfully the discoverability is low. It has one running web application with a security grade of \u201cD\u201d (from the related assets tab, not shown).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1024x488.png\" alt=\"\" class=\"wp-image-55\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-1024x488.png 1024w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-500x238.png 500w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-768x366.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image.png 1321w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 4. A View into Security Context for an Acme Homes Asset<\/em><\/p>\n\n\n\n<p>There are multiple paths to CyCognito discovery information depending on the user&#8217;s roles and goals. For organizations with mature automation workflows, CyCognito discovery information is available through REST API.<\/p>\n\n\n\n<p>Every organization needs to have confidence in what they are seeing before assigning staff to remediate. For this reason, evidence is collected for every discovery data point and made readily available. This is especially important for geographically distributed teams and multiple business units.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Find out more about CyCognito\u2019s Discovery and Contextualization services<\/h2>\n\n\n\n<p>Carried out manually, discovery and all of its sub-tasks are time-consuming and prone to error. The larger and more complex the organizational structure, the more necessary an automated and comprehensive discovery process becomes.&nbsp;<\/p>\n\n\n\n<p>CyCognito is a cloud-native software-as-a-service that was built to meet the external risk requirements of the largest and most complex organizations. If you are not a CyCognito customer and want to find out more about how we can help you ensure you have the most up-to-date external asset inventory, please contact us.&nbsp;<\/p>\n\n\n\n<p>A detailed technical datasheet on Discovery and Contextualization is also available for download&nbsp;<a href=\"\/resources\/datasheets\/discovery-and-contextualization\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[12,13,11,15,14],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-product","tag-asset-inventory","tag-context","tag-discovery","tag-exposure","tag-reconnaissance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-27T08:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T16:10:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jason Pappalexis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Pappalexis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\"},\"author\":{\"name\":\"Jason Pappalexis\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\"},\"headline\":\"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure\",\"datePublished\":\"2023-11-27T08:50:00+00:00\",\"dateModified\":\"2025-06-19T16:10:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\"},\"wordCount\":1393,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png\",\"keywords\":[\"Asset Inventory\",\"Context\",\"Discovery\",\"Exposure\",\"Reconnaissance\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\",\"name\":\"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png\",\"datePublished\":\"2023-11-27T08:50:00+00:00\",\"dateModified\":\"2025-06-19T16:10:10+00:00\",\"description\":\"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\",\"name\":\"Jason Pappalexis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"caption\":\"Jason Pappalexis\"},\"description\":\"Sr. Technical Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog","description":"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/","og_locale":"en_US","og_type":"article","og_title":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog","og_description":"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.","og_url":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/","og_site_name":"CyCognito Blog","article_published_time":"2023-11-27T08:50:00+00:00","article_modified_time":"2025-06-19T16:10:10+00:00","og_image":[{"width":2000,"height":800,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png","type":"image\/png"}],"author":"Jason Pappalexis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Pappalexis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/"},"author":{"name":"Jason Pappalexis","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b"},"headline":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure","datePublished":"2023-11-27T08:50:00+00:00","dateModified":"2025-06-19T16:10:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/"},"wordCount":1393,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png","keywords":["Asset Inventory","Context","Discovery","Exposure","Reconnaissance"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/","url":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/","name":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory-1024x410.png","datePublished":"2023-11-27T08:50:00+00:00","dateModified":"2025-06-19T16:10:10+00:00","description":"An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito\u2019s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-external-asset-inventory.png","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Discovery: Don\u2019t Let the Wrong Definition Impact Your Risk Exposure"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b","name":"Jason Pappalexis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","caption":"Jason Pappalexis"},"description":"Sr. Technical Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":5,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/48\/revisions"}],"predecessor-version":[{"id":1577,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/48\/revisions\/1577"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}