Was Vice President of Marketing at CyCognito
September 9, 2020
Improving Vulnerability Management by Emphasizing your POV (Prioritization, Optimization, and Visibility) Vulnerability management, and the security testing that is part of it, face ever-changing demands. More aggressive attack techniques and legislative requirements alike have driven the need for: Currently, though, both large and small organizations rely on fairly standard vulnerability management processes that have stabilized over the past two decades but don’t necessarily address today’s requirements. Before we look at the mismatch between modern vulnerability management needs and today’s defacto processes, let’s take a step back and look at the steps involved in vulnerability management. Step-by-Step No matter how they…
Was Vice President of Marketing at CyCognito
September 9, 2020
Here are some news ways to manage the digital risk that comes along with your expanding business presence due to digital transformation.
Was Director of Technical Product Marketing at CyCognito
May 27, 2020
Learn how Passive DNS replication can be used for mitigating malware attacks, phishing attack prevention, and securing your attack surface.
Rule Your Risk
May 22, 2020
Monitoring IT subsidiary risk has to be an ongoing process that absorbs oversight of new subsidiaries and their ever-changing attack surfaces.
Rule Your Risk
April 28, 2020
When you merge with or acquire an organization, you take on its risk, too. Avoid unnecessary risk by review these five recommendations.
CEO & Co-Founder
April 21, 2020
Best practices for securing your attack surface during mandated WFH. Examine key risks with VPNs, remote desktop protocol (RDP) and cloud services.
Rule Your Risk
February 4, 2020
Your attack surface has changed. It’s time for a new paradigm and admit the old ways of thinking aren’t compatible with today’s varied IT ecosystem.
Was Vice President of Marketing at CyCognito
January 7, 2020
The term “attack surface” is sometimes defined as different ways an organization can be breached. But that is really just the sum of your attack vectors.
CTO and Co-Founder
November 19, 2019
Hackers don’t think the way an IT person thinks–they’re looking for an easy win. Ensure your security posture by using advanced cybersecurity analytics.
CEO & Co-Founder
November 19, 2019
CyCognito’s nation-state-grade reconnaissance platform prevents cybercrime by gathering dozens of fingerprints per asset and using graph data modeling.