Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 
Research

​​Gift or Grift? How Retailers Can Combat Cyber Threats This Season

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
November 21, 2024

CyCognito examined an anonymized set of ecommerce assets collected from November 2023 to October 2024. While there is evidence of better security practices, some basic vulnerabilities and misconfigurations persist. Retailers need to take the time to make sure their ecommerce sites are keeping valuable PII and financial information safe.



Research

Emerging Threat: Palo Alto PAN-OS CVE-2024-0012 & CVE-2024-9474

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
November 20, 2024

On November 18, 2024, Palo Alto Networks (PAN) disclosed two serious vulnerabilities in PAN-OS. Chained together, these vulnerabilities create the perfect conditions for pre-authenticated Remote Code Execution (RCE). CyCognito discovery and testing engines actively detect vulnerable assets and all customers have access to an in-platform emerging security issue announcement as of November 20th, 2024.



Strategy

How to Budget for EASM

Tim-Matthews
By Tim Matthews
Chief Marketing Officer
November 18, 2024

External Attack Surface Management (EASM) is crucial for reducing risks associated with unknown and unmanaged digital assets, which are responsible for over 65% of breaches. This post provides practical guidance on budgeting for EASM, including cost ranges, staffing requirements, and justifications based on risk reduction, labor savings, and operational efficiencies. Learn how EASM can optimize your security investments while improving your organization’s overall cybersecurity posture.



Research

A New Framework: Understanding Exposure Management 

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
November 11, 2024

Savvy security leaders are moving from the legacy framework of vulnerability management to the emerging framework of exposure management. To learn more about common challenges security teams might face on their journey to exposure management, check out this report: “Vulnerability Management to Exposure Management: A Roadmap for Modernizing Your Application Attack Surface Security.”



Research

Emerging Threat: FortiJump (CVE-2024-47575) 

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 29, 2024

CVE-2024-47575 (FortiJump) is a missing authentication vulnerability affecting critical functions in FortiManager and FortiManager Cloud versions. Approximately 60,000 assets are externally exposed worldwide. All CyCognito customers have access to an in-platform emerging threat announcement and methods to identify potentially vulnerable assets.



Research

Emerging Security Issue: Fortinet FortiOS CVE-2024-23113

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 16, 2024

CVE-2024-23113 is a critical (9.8) Fortinet remote code execution (RCE) vulnerability affecting a variety of Fortinet products and versions. CyCognito is investigating active tests for CVE-2024-9463. Users can check if their assets are potentially vulnerable using provided filters in the CyCognito platform.



Research

Emerging Security Issue: Multiple CUPS Vulnerabilities

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 16, 2024

On September 26, 2024, four critical RCE vulnerabilities were disclosed in components of the open-source printing system CUPS. CyCognito is investigating active detection methods for these vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.



Research

Emerging Security Issue: Multiple Palo Alto Networks Expedition PAN-OS Firewalls Vulnerabilities

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 16, 2024

On October 9th, 2024, five vulnerabilities affecting Palo Alto Networks Expedition before version 1.2.96 were disclosed by Palo Alto Networks. These issues include OS command injection, SQL injection, cleartext storage of sensitive data, and reflected XSS vulnerabilities. Though active exploitation has not been reported, CyCognito has released an active test and in-app notification covering these issues due to risks posed by their severity and ease of exploitation.



Perspectives

Six Signs that Exposure Management is Right for Your Organization

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
October 14, 2024

Exposure Management (EM), introduced by Gartner in 2022, represents the evolution or vulnerability management. With EM, security teams can address visibility and testing gaps, and stay ahead of threats. This blog includes six signs that your organization needs EM, and five essential requirements to implement it.



Perspectives

Five Questions Your EASM Vendor Doesn’t Want You to Ask

Tim-Matthews
By Tim Matthews
Chief Marketing Officer
October 7, 2024

With EASM becoming essential to security operations, many vendors are jumping on board, but not all solutions are enterprise-grade. Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions—if they can’t answer, it’s a red flag.




Topics



Search the Blog



Recent Posts




Tim Matthews
How to Budget for EASM
By Tim Matthews
November 18, 2024




Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.