Attack Surface Score - How do you compare?
What security lessons can you learn from your attack...
EASM
Increasing digitalization and connectivity mean the attack surfaces of most organizations are growing. This means more IT assets to track...
press release
CTEM step-by-step guide | Stage one: Scoping
CTEM
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of...
executive intelligence
Threat Context monthly: Executive intelligence briefing for August 2024
Research & Threat Intel
Welcome to the Threat Context monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
CSRF simplified: A no-nonsense guide to Cross-Site Request Forgery
Application Security
Cross-Site Request Forgery (CSRF) is a serious web security vulnerability that allows attackers to exploit active sessions of targeted users...
press release
Supercharge domain discovery with AI-powered External Attack Surface Management...
EASM
Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing...