Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Confirmation Password Security Demo
page
Thanks for reaching out about Specops Software, Outpost24’s Active Directory Password Security solution A password security expert will be in touch soon to schedule your live demonstration. With a comprehensive suite of password security solutions, including password policy with breached password protection, self-service password reset, user verification at the service...
Discovering wildcard domains in your external attack surface
Blog
Getting a complete and accurate overview of all your online assets is key to protect your external attack surface from bad actors. Knowing what you have exposed online is always the first step. Wildcard domains can pose a challenge to External Attack Surface Management (EASM) solutions in this regard. But...
How to master pen testing in an agile environment   
Blog
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective to work together throughout the product lifecycle in a DevOps...
Active Directory Password Security
page
Reduce the Risk Passwords Pose with Specops Software’s Password Suite  Specops Software protects your business data by blocking weak passwords and securing user authentication. With a complete portfolio of solutions natively integrated with Active Directory, Specops ensures sensitive data is stored on-premises and in your control.   Specops Password Policy Strengthen password...
Threat Context Monthly: Executive intelligence briefing for January 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team.  Spotlight threat: X (Twitter) accounts hacked  Over the past few weeks there has been an uptick of compromises on the...
Akira Ransomware-as-a-Service (RaaS) targeting Swedish organizations  
Blog
Recent ransomware attacks on European organizations have attracted significant attention, primarily due to the involvement of threat actors with Russian connections or origins. Of particular concern is the latest attack on an IT service provider, which has had a profound impact on Swedish companies, government agencies, and municipalities.  About the...
What is an impersonation attack? How to prevent brand impersonation
Blog
Companies grow through mergers and acquisitions. Marketing teams promote new products. New products spawn new web domains. As brand names, URLs, and cloud IT infrastructure proliferate, so does an organization's vulnerability to impersonation attacks. Impersonation attacks are a fast-growing form of cybercrime where attackers impersonate contacts or organizations to steal...
Outpost24 Expands Leading External Attack Surface Management Solution with Credential Threat Intelligence 
Blog
Philadelphia, PA, January 10, 2024 - Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced the integration of credential threat intelligence into its external attack surface management solution. Powered by the Outpost24 Threat Intelligence solution, this new data integration will allow Outpost24 EASM customers to identify...
The scope of cybersecurity in 2024: Predictions from the experts
Blog
Coming into 2023, we predicted that the economic downturn would fuel sophisticated fraud, the growth of serverless workloads will increase the attack surface, and there would be more MFA bombing attacks. As we look to 2024, Outpost24's team of security experts have predicted the emerging threats that will shape the...
How to monitor your organization’s presence on the dark web
Blog
Googling your organization’s name will bring up all sorts of information. However, there’s more to the internet than the surface web that’s accessed through regular search engines: the deep web and the dark web. To stay ahead of potential threats and maximize incident response performance, security teams need a complete...