Six steps for running a successful security program
Cybersecurity News
Starting a security program can be challenging for some organizations, especially running a mature program across a large business. Resourcing,...
Threat Context monthly: Executive intelligence briefing for January 2025
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
Outpost24’s Capture the Flag event recap: “json returns”
Application Security
On the crisp morning of December 13th, 2024, as the clock struck 09:59 CET, anticipation filled the air. Around the...
press release
How to protect your site from subdomain takeover
EASM
Subdomain takeover is a serious risk for organizations with a large online presence (which is a lot of businesses in...
press release
CISO predictions: What does 2025 hold for attack surface...
Cybersecurity News
We’ve asked Outpost24’s CISO, Martin Jartelius, what 2025 is likely to hold for organizations using attack surface management (ASM) tools....