Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 
Strategy

How to Budget for EASM

Tim-Matthews
By Tim Matthews
Chief Marketing Officer
November 18, 2024

External Attack Surface Management (EASM) is crucial for reducing risks associated with unknown and unmanaged digital assets, which are responsible for over 65% of breaches. This post provides practical guidance on budgeting for EASM, including cost ranges, staffing requirements, and justifications based on risk reduction, labor savings, and operational efficiencies. Learn how EASM can optimize your security investments while improving your organization’s overall cybersecurity posture.



Research

A New Framework: Understanding Exposure Management 

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
November 11, 2024

Savvy security leaders are moving from the legacy framework of vulnerability management to the emerging framework of exposure management. To learn more about common challenges security teams might face on their journey to exposure management, check out this report: “Vulnerability Management to Exposure Management: A Roadmap for Modernizing Your Application Attack Surface Security.”



Strategy

Common security testing approaches leave gaps. Here’s how to find them.

Jason-Pappalexis
By Jason Pappalexis
Sr. Technical Marketing Manager
September 16, 2024

Gaps in security testing involve more than missed assets – infrequent and inaccurate security testing can be just as big. This blog provides a five-step plan to help you find testing gaps and tighten your testing program, improving risk management, decision-making, and cost efficiency. A must-read for anyone looking to strengthen their security across their external attack surface.



Research

It’s 10pm – Do You Know Where Your PII Is?

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
September 6, 2023

Have you ever wondered just how much the average external attack surface changes every month?



Perspectives

Vulnerability Prioritization: What to Consider

Greg-Delaney
By Greg Delaney
Was a Senior Product Marketing Manager at CyCognito
August 24, 2023

Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.



Perspectives

When your Security Tools Introduce Security Weaknesses

Sam-Curcuruto
By Sam Curcuruto
Was Sr. Director, Product Marketing at CyCognito
November 23, 2021

Everything that is exposed to the internet, including your security tools and appliances, must be cataloged and tested for security gaps and weaknesses.



Research

Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone

Jim-Wachhaus
By Jim Wachhaus
Was Director of Technical Product Marketing at CyCognito
April 1, 2021

With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.



Research

Lessons Learned from Microsoft Exchange Zero-Days

Jim-Wachhaus
By Jim Wachhaus
Was Director of Technical Product Marketing at CyCognito
March 16, 2021

Microsoft Exchange Vulnerabilities – a perfect example why using old technology impacts your security posture today.



Perspectives

Get Started on Zero Trust

Raphael-Reich
By Raphael Reich
Was Vice President of Marketing at CyCognito
February 25, 2021

Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.



Perspectives

Shift Your Security Posture: Strength in Shared Vulnerability

Jim-Wachhaus
By Jim Wachhaus
Was Director of Technical Product Marketing at CyCognito
December 17, 2020

Lessons Learned – Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.




Topics



Search the Blog



Recent Posts






Tim Matthews
How to Budget for EASM
By Tim Matthews
November 18, 2024


Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.