Outpost24 logo
Cisco issues warning for critical 0-day vulnerability exploited in...
Vulnerability Management
Cisco warns about a critical zero-day vulnerability in its IOS XE that enables attackers to take full control of an...
risk-based strategies
Traditional vs Risk-Based Vulnerability Management: What’s the difference?
Vulnerability Management
This blog compares traditional approaches to vulnerability management to a risk-based one. Learn about the differences between the two, and...
smashing security
Vulnerability prediction insights from Outpost24 on Smashing Security
Vulnerability Management
Carole Theriault from Smashing Security had a sit down with John Stock, our Director of Product Management here at Outpost24....
How to use the MITRE ATT&CK framework with threat...
Vulnerability Management
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...
What are security misconfigurations?
Vulnerability Management
Misconfigurations are often seen as an easy target, as it can be easy to detect on misconfigured web servers, cloud...