Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 
Products

No Room for Doubt – Why Security Testing is Essential for your External Attack Surface

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
January 9, 2024

Security testing externally exposed assets is essential to building a risk profile but is difficult using legacy approaches.



Products

Discovery: Don’t Let the Wrong Definition Impact Your Risk Exposure

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
November 27, 2023

An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito’s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.



Products

API Detection with CyCognito

Tim-Matthews
By Tim Matthews
Chief Marketing Officer
November 6, 2023

CyCognito Attack Surface Management (ASM) now offers the ability to discover APIs on an organization’s attack surface. Given the proliferation of APIs and their attractiveness to attackers, this capability is an important new tool for security teams. This post describes the issue and how CyCognito ASM solves it.



Products

Navigating Compliance Challenges Across Your External Attack Surface

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
October 27, 2023

Achieving compliance for any sized organization is often time-consuming and stressful, forcing many security teams to divert their attention away from the tasks at hand. The value (and necessity) of achieving a successful audit efficiently cannot be understated, but the challenges are real. Using CyCognito to discover and test externally exposed assets and dynamically map issues to compliance frameworks provides the continuous visibility needed to streamline their work.



Products

Automated Pen Testing for Efficient Red Teaming

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
October 9, 2023

Explore the complexities of manual pen testing and red teaming. How can you leverage automated pen testing solutions to optimize your team’s process?



Products

How to Ensure WAF Coverage Using CyCognito

Aviel-Tzarfaty
By Aviel Tzarfaty
Was a Product Manager at CyCognito
September 29, 2023

Web Application Firewalls (WAFs) are the most common protection for web applications. WAFs protect web applications by filtering and monitoring HTTP traffic between the application and the internet. However, WAFs need to be deployed and configured to protect web applications specifically. If they are not, this leaves open a potential route for an attacker.



Products

Exploit Intelligence: An EASM Force Multiplier

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
October 20, 2022

Threat intelligence can feel like a firehose of data to security teams who are already struggling to keep their heads above water patching, fixing and hardening networks.



Products

CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
May 20, 2022

“Bad news, early” is a common business mindset designed to communicate urgency behind the need to identify small problems before they become big problems. 



Products

Identifying and Mitigating Potential Russian Cyber Attacks – Proactive Measures in the CyCognito Platform

Jeff-Romano
By Jeff Romano
Was Chief Customer Officer at CyCognito
March 3, 2022

Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors.



Products

Two CyCognito Log4j2 Testing Modules

Jim-Wachhaus
By Jim Wachhaus
Was Director of Technical Product Marketing at CyCognito
December 21, 2021

A timeline of how we responded to Log4j and a technical walk-through of our Active Detection Module and other steps we’ve taken .




Topics



Search the Blog



Recent Posts




Tim Matthews
How to Budget for EASM
By Tim Matthews
November 18, 2024




Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.