The Fundamentals of Cloud Security Stress Testing

May 8, 2024 at 07:06AM John Lambert from Microsoft defines the different mindsets of defenders and attackers in IT systems. Defenders focus on listing and eliminating security gaps, while attackers aim to breach by targeting the weakest link. Embracing the attacker’s perspective through penetration testing is crucial, especially in cloud environments. The article also highlights … Read more

Paris Olympics Cybersecurity at Risk via Attack Surface Gaps

May 3, 2024 at 05:09PM The 2024 Paris Olympics face cybersecurity challenges despite improved protection compared to previous events. Outpost24 identified security gaps including open ports, SSL misconfigurations, and domain squatting, giving attackers opportunities. France’s ANSSI agency is preparing for cyber threats, but diverse, sophisticated attacks are expected, influenced by geopolitics. Securing the rapidly changing … Read more

What is Exposure Management and How Does it Differ from ASM?

March 5, 2024 at 06:45AM Startups and mid-market businesses heavily rely on cloud services, leading to a complex and distributed attack surface that’s challenging to monitor and secure. Exposure management in cybersecurity aims to provide visibility and prioritize vulnerabilities to reduce business risks. Intruder offers automated vulnerability management to discover and prioritize weaknesses across the … Read more

IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface

February 6, 2024 at 05:32PM IONIX has completed its $42 million A Round financing, including $15 million from new investor Maor Investments, expanding its total funding to $50.3 million. The funding will be used to accelerate market activities, develop product roadmap, and enhance Threat Exposure Management capabilities. Cyber veteran Chad Kinzelberg joins the board to … Read more

Why the Right Metrics Matter When it Comes to Vulnerability Management

February 4, 2024 at 12:19PM The article emphasizes the importance of measuring the effectiveness of vulnerability management programs using the right metrics and analytics. It highlights key metrics to track, such as scan coverage, average time to fix, risk score, issues, and attack surface monitoring. Proper measurement enables informed decision-making, resource allocation, and improved security … Read more

Getting off the Attack Surface Hamster Wheel: Identity Can Help

January 10, 2024 at 07:22AM IT professionals have developed a deep understanding of the enterprise attack surface and the challenges it poses for cybersecurity. The expansion of the attack surface due to cloud services, remote working, IoT, supply chains, AI, and social networking requires a shift in security strategy. Prioritizing digital identities and investing in … Read more

Modern Attack Surface Management (ASM) for SecOps

December 14, 2023 at 05:57PM The text discusses the challenges in securing today’s attack surface and the need for modern Attack Surface Management (ASM) solutions in SecOps. It emphasizes the importance of robust ASM solutions that provide rapid discovery, real-time risk assessment, proactive risk remediation, and an integrated platform approach. The Trend Vision One platform … Read more