Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 
Company

CyCognito Recognized as Leader in the GigaOm Radar for Attack Surface Management 2024

Carrie-Oakes
By Carrie Oakes
Sr. Director of Product Marketing
March 18, 2024

This GigaOm Radar report examines 22 of the leading ASM solutions in the market. It compares offerings against the key capabilities, including continuous discovery of attack surface, managing inventory of attack surface assets, identifying risks in attack surface, and false positive management. CyCognito was named a Leader and Fast Mover because of its innovative approach to asset discovery and vulnerability assessment, balanced with a solid foundation in mature platform offerings.



Products

Combining External Attack Surface Management and Crowdsourced Security Testing – Webinar Recap

Tim-Matthews
By Tim Matthews
Chief Marketing Officer
March 12, 2024

In a recent webinar, CyCognito’s Rob Gurzeev and Bugcrowd’s Casey Ellis discussed the benefits of integrating automation, crowdsourced security testing, and EASM, highlighting how these technologies improve security, reduce data breach risks, and aid in regulatory compliance.



Perspectives

How Ströer, Uncovers and Secures Hidden Digital Assets with CyCognito

Brittany-Busa
By Brittany Busa
Customer Marketing and Advocacy Lead
March 4, 2024

Benjamin Bachmann, VP of Group Information Security at Ströer, transformed the German media conglomerate’s security posture by implementing CyCognito.



Perspectives

The CISA Points Way Forward for More Effective Vulnerability Management with Directive 23-01

Carrie-Oakes
By Carrie Oakes
Sr. Director of Product Marketing
February 26, 2024

CISA’s proactive approach to cybersecurity is highlighted, focusing on two directives: BOD 22-01, which mandates agencies to consult the “Known Exploited Vulnerabilities Catalog,” and BOD 23-01, aimed at improving agency asset visibility and vulnerability detection. These directives emphasize asset discovery and vulnerability enumeration as crucial activities for risk reduction. CyCognito’s platform aligns with these directives by automating discovery, contextualizing assets, and prioritizing vulnerabilities based on attacker perspective, enabling organizations to efficiently close gaps in their attack surface management.



Strategy

The Long Tail of the Supply Chain: Leveraging Exposure Management to Mitigate Risk from Current or Former Vendors

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
February 20, 2024

Networking equipment vendor Juniper Networks recently exposed current and former customer information due to a Salesforce misconfiguration. While incidents like these can give attackers valuable data and footholds into your network, leveraging exposure management best practices and processes can help organizations mitigate these risks.



Products

Three Approaches to External Attack Surface Management

Rob-Gurzeev
By Rob Gurzeev
CEO & Co-Founder
February 5, 2024

There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.



Research

Emerging Security Issue: Ivanti Vulnerabilities CVE-2023-46805 and CVE-2024-21887

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
January 24, 2024

Two security issues affecting the popular Ivanti Connect Secure and Ivanti Policy Secure remote access SSL VPN systems can be chained together to give unauthenticated attackers remote access to critical systems. CyCognito’s active testing protects our current customers and delivers key insights about these vulnerabilities in the CyCognito platform.



Products

360 Degree Threat Exposure Management with CyCognito and Axonius

Randy-Streu
By Randy Streu
SVP, Global Channels & Alliances
January 16, 2024

Axonius and CyCognito, working together, provide a broad picture of risk based on internal and external intelligence allowing mutual customers to efficiently prioritize threats based on their potential for real-world exposure.



Products

No Room for Doubt – Why Security Testing is Essential for your External Attack Surface

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
January 9, 2024

Security testing externally exposed assets is essential to building a risk profile but is difficult using legacy approaches.



Products

Discovery: Don’t Let the Wrong Definition Impact Your Risk Exposure

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
November 27, 2023

An accurate external asset inventory forms the foundation for reduced exposure and risk. CyCognito’s unique approach to organizational reconnaissance, asset discovery, and contextualization provides IT Security teams with meaningful information that reduces time to remediation.




Topics



Search the Blog



Recent Posts




Tim Matthews
How to Budget for EASM
By Tim Matthews
November 18, 2024




Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.