Sr. Director of Product Marketing
February 26, 2024
CISA’s proactive approach to cybersecurity is highlighted, focusing on two directives: BOD 22-01, which mandates agencies to consult the “Known Exploited Vulnerabilities Catalog,” and BOD 23-01, aimed at improving agency asset visibility and vulnerability detection. These directives emphasize asset discovery and vulnerability enumeration as crucial activities for risk reduction. CyCognito’s platform aligns with these directives by automating discovery, contextualizing assets, and prioritizing vulnerabilities based on attacker perspective, enabling organizations to efficiently close gaps in their attack surface management.
Chief Marketing Officer
November 6, 2023
CyCognito Attack Surface Management (ASM) now offers the ability to discover APIs on an organization’s attack surface. Given the proliferation of APIs and their attractiveness to attackers, this capability is an important new tool for security teams. This post describes the issue and how CyCognito ASM solves it.
Product Marketing Manager
September 6, 2023
Have you ever wondered just how much the average external attack surface changes every month?
Was a Senior Product Marketing Manager at CyCognito
August 24, 2023
Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.
Chief Marketing Officer
August 3, 2023
Manage the entire attack surface with external exposure management. Learn more about the key ways to safeguard your attack surface at CyCognito.
Was a Media Manager at CyCognito
November 17, 2022
Recent spate of Aussie breaches spur huge fines to push security teams to tighten their external attack surface.
Was a Media Manager at CyCognito
November 17, 2022
What is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?
Was Hacker in Residence at CyCognito
March 30, 2022
Over the years, pen tests have increasingly become a mandated component of regulatory and compliance standards. The Payment Card Industry Data Security Standard (PCI DSS) requiring pentests be performed in card data environments (CDEs) grew this need for compliance-based pen testing.
CEO & Co-Founder
February 24, 2022
Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface.
CEO & Co-Founder
February 24, 2022
Risk remediation is a wildly unequal race between attackers with advanced processes and attack tools and defenders struggling to keep afloat with tedious, manual processes and 20-year-old technology.