Skip to main content


Outpost24 product managers
As digital transformation continues to take hold, enterprises across industries are under mainstream pressure to tighten their cyber defense as they evolve to cloud and become more application centric. Despite many boards boosting security resources and increasing spend in 2019, more than 3,800 data breaches have hit organizations with dire consequence. In the spirit of the holiday season we have compiled a list of 2020 predictions from our in-house security experts on the key trends and threats that should be high on any CISO’s agenda to deliver greater cyber hygiene and multi-layered defense.
Charlie Eriksen, CTO Adversary
Increasingly, boardrooms are starting to recognize a simple fact: Being hacked is a question of if, not when. It’s no secret that most companies have experienced some type of data breach, often without their own knowledge. This all adds up to estimates that a cyber-attack occurs every 39 seconds, if you believe such statistics. That puts huge pressure on organizations to decrease the likelihood of not only adding to this statistic, but also fulfilling their data privacy duty they have towards their users, employees and customers.
John Stock, Network Security Manager Outpost24
Outpost24 recognized among Vulnerability Risk Management vendors by analyst
Hugo van den Toorn, Manager Offensive Security at Outpost24
In this blog I will share why we use hardware implants for our Red teaming and physical penetration tests, how they work and how we make them.
Sergio Loureiro, Cloud Security Director
Check out our interactive infographic of the top 10 cloud security myths and common misconceptions.

By Sergio Loureiro, Product Manager Outpost24
While the idea of a Shared Responsibility Model is conceptually understood, organizations taking advantage of the transformative power of public cloud platforms continue to come short practically, of the implementation of basic security controls, giving hackers a one-way ticket to their critical assets and data.
We understand that vulnerability detection is time critical and can impact how vulnerabilities are managed. To improve zero-day detection, organizations can use a vulnerability management solution to improve the time from detection to fixing a critical vulnerability by utilizing specialist intelligence and tools.
Jonas Mattsson, Ghost Labs
This post explains how the vulnerabilities in Oracle Webcenter Site were found and how they can be exploited.
Davey Winder, security journalist
A Continuous Adaptive Risk and Trust Assessment (CARTA) approach to your security posture may not be a new thing, Gartner formalized the idea two years ago at its 2017 security summit, but neither is it an advisable one: it’s absolutely essential for organizations to adopt agile security
Bob Egner, Head of Product
Check out our interactive infographic to see how your peers are managing their application and cloud security

Looking for anything in particular?

Type your search word here