Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Optimizing Asset Management and Incident Response: CyCognito's New Integration with ServiceNow CMDB

Effective asset management and rapid incident response are crucial for maintaining cybersecurity defenses. To address these needs, and building on its previous Vulnerability Response module integration, CyCognito has announced a new certified integration with ServiceNow’s Configuration Management Database (CMDB).

Exploited: Ivanti Virtual Traffic Manager (vTM ) (CVE-2024-7593)

This post is based on ongoing security research – the post will continue to be updated as we get additional information… A critical vulnerability has just been announced in Ivanti’s Virtual Traffic Manager (vTM) that allows unauthenticated remote attackers to create administrator users.

Non human Identities - Permissions, Third Party Vulnerabilities and Risk

Non-human identities (NHIs) dominate the era of cloud services and SaaS applications. They are the identities that authenticate between different servers, APIs and third party integrations to provide programmatic access to data and services. Non-human identities utilize different protocols, such as OAuth, REST and SSH.

Is Gartner Waving 'Bye Bye Bye' to EASM?

TLDR: The ways that organizations find and fix security exposures have been flawed for years. Traditional vulnerability management (VM) programs have failed to address the core issues. What’s worse, the relatively new category of External Attack Surface Management (EASM) has not solved the problems it aimed to solve. But hope, in the form of Exposure Management, is on the way.

Creating Visibility In Your Digital Environment with Attack Surface Management (ASM)

In today’s IT environments, creating visibility in your digital environment with Attack Surface Management (ASM) is crucial for maintaining robust cybersecurity. ASM provides essential insights and tools to identify and protect your organization. This blog addresses several key questions that ASM helps answer, bolstering your resilience against cyber threats.

Outpost24 Launches AI Domain Discovery in External Attack Surface Management

Outpost24 is pleased to announce the integration of a new Artificial Intelligence (AI) assistant into its Exposure Management Platform. This groundbreaking AI Domain Discovery feature enables Outpost24 customers to effortlessly identify domains belonging to their organization, significantly improving the speed and accuracy of domain ownership and classification.

Network Vulnerabilities Assessment: Benefits & Steps

Securing a network against cyber threats requires a thorough understanding of its vulnerabilities. A vulnerability assessment is a detailed process aimed at identifying, evaluating, and ranking potential weaknesses within a network setup. From examining configurations to assessing access controls, this assessment dives deep into every aspect of the network to uncover areas of vulnerability.

Actionable Threat Intelligence - Boosting Attack Surface Management

Modern cybersecurity challenges require a comprehensive approach to attack surface management. As technology evolves, organizations find themselves facing a multitude of cyber threats from various directions. These threats are not limited to internal systems but extend across external attack surfaces and the digital supply chain. To navigate this complex threat landscape, organizations need more than just raw data; they need actionable threat intelligence that provides context and guides targeted action.