Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

External Exposure & Attack Surface Management For Dummies

As your attack surface has grown to cloud infrastructures and across subsidiaries, attackers are looking for and finding unknown and unmanaged assets to serve as their entry points. 

 
GigaOm Radar for Attack Surface Management

The expansion of an organization's attack surface continues to present a critical business challenge. Download the GigaOm Radar for Attack Surface Management to get an overview of the available ASM solutions, identify leading offerings, and evaluate the best solution for you.  

Products

Identifying and Mitigating Potential Russian Cyber Attacks – Proactive Measures in the CyCognito Platform

Jeff-Romano
By Jeff Romano
Was Chief Customer Officer at CyCognito
March 3, 2022

The situation in Ukraine highlights that cyber attacks are an integral part of modern warfare and impact organizations outside of the central conflict. As a result, governments and security agencies globally are advising organizations to be prepared for continued attacks related to the current crisis.

Effective immediately, the CyCognito platform is able to help identify and mitigate the gaps used by Russian state-sponsored threat actors. The platform has an Exploit Intelligence Advisory that aligns with CISA ​​Alert (AA22-011A). We are making this Exploit Intelligence Advisory and the Advisory for Log4Shell available free of charge for all CyCognito customers.

About Exploit Intelligence Advisories

As a brief background, CyCognito Exploit Intelligence Advisories provide you with an understanding of all assets susceptible to a particular threat; in this case, Russian state-sponsored cyber threats as described in CISA Alert AA22-011A. Summary results are shown as a pie chart (see image below) that is divided between assets that tested as –

  • Vulnerable, or
  • Not vulnerable

Advisory Example:

This allows you to see and communicate the domain of potential risk and the range of assets in your attack surface that are currently vulnerable to a cyber attack of the type described in CISA AA22-011A.

As with other security issues detected by the CyCognito platform, a wealth of information is provided to help you operationalize risk management and accelerate remediation. From the Advisory, you can drill down to understand the relevant details and take remediation actions. With Exploit Intelligence, you can also safely validate whether the vulnerabilities enumerated in the Advisory can be exploited. This provides your Security and IT Operations teams with evidence to prioritize remediation efforts and it also increases remediation efficiency.

CyCognito continues to work diligently to help keep our customers and the industry protected by proactively identifying their attack surface gaps and giving them the information they need to get ahead of attacks and preventing breaches.

If you are interested in experiencing CyCognito Exploit Intelligence in your environment, let us know. If you’re already a CyCognito customer, the Russian state-sponsored threat Advisory discussed above is available now in your platform, simply reach out to your Customer Success manager if you’d like to discuss or understand it more.




About the Author

Jeff-Romano

Jeff Romano

Was Chief Customer Officer at CyCognito

Jeff Romano, a former Chief Customer Officer at CyCognito, has managed highly successful global customer success teams for high-growth software companies, both cloud-based and on-premise, for more than 25 years and is passionate about transforming the customer experience.

Topics



Search the Blog



Featured Posts








Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.

Related Guides

Discover insights on application security, exposure management and other key topics below.

Learning Center Attack Surface
Understanding Attack Surface Management

The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.

Learning Center Exposure Management
Exposure Management in Cybersecurity: Concepts and Technologies

Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.

Learning Center Vulnerability Assessment
Vulnerability Assessment: Process, Challenges & Best Practices

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

Related Products

Explore CyCognito modules ASM, AST and EI in the resources below.

Platform > Products
Attack Surface Management

Scalable, continuous, and comprehensive testing for all external assets, all the time.

Platform > Products
Automated Security Testing

CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.

Platform > Products
Exploit Intelligence

CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.