An image of a joker card
Discovering wildcard domains in your external attack surface
EASM
Getting a complete and accurate overview of all your online assets is key to protect your external attack surface from...
How to master pen testing in an agile environment   
Application Security
Traditional pen testing can’t keep up with agile teams. Learn how PTaaS can meet the speed and flexibility requirements of...
executive intelligence
Threat Context Monthly: Executive intelligence briefing for January 2024
Research & Threat Intel
The Threat Context Monthly blog series provides a comprehensive roundup of the most relevant cybersecurity news, and threat information from...
Outpost24 logo
Akira Ransomware-as-a-Service (RaaS) targeting Swedish organizations  
Cybersecurity News
The latest ransomware attack on an IT service provider has had a profound impact on Swedish companies, government agencies, and...
impersonation-attacks
What is an impersonation attack? How to prevent brand...
EASM
Learn how to maintain control of your online assets and prevent brand impersonation attacks with external attack surface management.