Visualisation of attack surface
How to prioritize risks in the external attack surface
EASM
In today’s dynamic digital landscape, organizations are confronted with an expanding attack surface that necessitates effective risk management to protect themselves from a wide...
cyber-intrusion
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks....
ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
outpost24 acquires sweepatic
Outpost24 acquires external attack surface management provider Sweepatic to...
Press Release
​LONDON, UK, 7 June, 2023 – Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic. Based...
smashing security
Vulnerability prediction insights from Outpost24 on Smashing Security
Vulnerability Management
Carole Theriault from Smashing Security had a sit down with John Stock, our Director of Product Management here at Outpost24....