Attack Surface Management
Why Pentesting-as-a-Service is Vital for Business Security
Conducting regular penetration tests (pentests) is a proactive option that identifies, evaluates and mitigates risks ...
MOVEit! An Overview of CVE-2023-34362
On May 31st, 2023, Progress disclosed a serious vulnerability in its MOVEit Transfer software. The vulnerability is remotely exploitable, does not require authentication, and impacts versions of the software that are 2023.0.1 ...
External Attack Surface Management: How Focusing on Basics Improves Security
External attack surface management (EASM) has become a vital strategy for improving cybersecurity, particularly amid recession fears that have stressed the business landscape across several sectors for many months. The task is ...
Attack Surface Management Vs. Vulnerability Management
Cybersecurity is full of acronyms. So many, in fact, that I would be hard-pressed to find someone who knows what they all stand for or clearly explain the subtle differences between many ...
The Impact of Digital Transformation on the Security of Connected Devices
Today’s tech-dependent enterprises are no strangers to change. Our customers’ experiences demonstrate that familiarity daily. Whether they operate in healthcare, financial services, manufacturing, education, or government, they must contend with a constantly ...
Content Discovery: Understanding Your Web Attack Surface
Attack Surface Management (ASM) tools find quite a lot of vulnerabilities on the Web. This really isn’t surprising, given that HTTP/S is by far the most common and broadest of all the ...
Cyber Cartography: Mapping a Target
As Phil Venables has said, “at some level, cyber defense is a battle over whether the attacker or defender has better visibility of the target. Action is key, yes, but without good ...
Multiple Layers of Security: Preventing Hacking Attempts in Crypto Casinos
Cybersecurity is crucial for every modern-day online business. According to the latest data, cybercrime is expected to cost the world $10.5 trillion annually by the end of 2025. Cybercriminals most often go ...
6 Ways to Vet Your Next ASM Vendor
Attack surface management (ASM) is a critical security function, and the market for ASM solutions is growing rapidly. However, with the evolution to ASM 2.0, the process of selecting a new ASM ...
ASM: The Best Defense is a Good Offense
About 10 years ago, security was relatively simple because everything occurred on premises. Change releases were tightly controlled by a change ticket and review process. In contrast, current networks consist of auto-scaling ...