Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Resource > Whitepapers
An emerging cybersecurity solution space with its own definition has been coined in recent years: Attack Surface Management or ASM. Gartner, Forrester and other industry analysts have described the term in recent reports, adding the word ‘external’ to indicate the outside-in perspective of these solutions. The term External Attack Surface...
Blog
How can you take a proactive approach to your organization’s cybersecurity strategy? Scoping the threat landscape and having a solid incident response plan is a good start. But you also need to continuously seek out vulnerabilities and weaknesses to remediate or mitigate. These vulnerabilities and weaknesses aren’t just limited to...
page
Website Terms of Use Introduction Outpost24 is committed to protecting your privacy rights. By accessing and using the Outpost24 website, www.outpost24.com (“the Site”), you agree to these Terms of Use. The Terms of Use describe how personal information (“Personal Information” shall have the meaning set out in Regulation (EU) 2016/679 of 27...
Blog
The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures...
Resource > Webinar
Sobre esta charla En este webinar exploraremos las últimas tendencias del campo de la cyberinteligencia de amenazas. Hablaremos de diferentes casos de uso, sus aplicaciones y cómo estos estan cambiando la forma de proteger a los usuarios, las empresas y sus datos. Tambien vemos como la cyberinteligencia de amenazas puede...
Blog
Philadelphia, PA, July 19, 2023 – Leading cyber risk platform provider Outpost24 today announced the release of Outpost24 CORE, a ground-breaking unified exposure management solution that gives unprecedented visibility and real-time insights into an organization’s IT asset inventory and their threat exposure across the entire attack surface. With the threat of cyberattacks...
Blog
PCI version 4.0 was released in March 2022, and all organizations that must be compliant with the regulation have a deadline of March 31, 2024 to do so. So, what does the new version say about pen testing? According to Requirement 11 of the Payment Card Industry Data Security Standard...
Resource > Research
Global online sales went up 71% year-over-year. As e-commerce sales get a massive boost in the wake of the coronavirus pandemic, so has targeted cyberattacks on the application layer. It’s never been more important for the retail sector to prioritize web application security to protect customer data and avoid costly...
Resource > Whitepapers
Embrace DevSecOps A primer for securing DevOps Web app attacks remain the #1 vector exploited in successful breaches. With agile development, apps run the risk of creating new vulnerabilities or perpetuating old ones on a weekly, daily, even hourly basis, security and risk managers need to step up a programmatic...
Resource > Whitepapers
Businesses are continuing to grow and investing more in technology stacks, creating more vulnerabilities as cyber criminals look for new risks to exploit. Security leaders are having to take a more strategic approach, especially as digital transformation grows creating demand for zero-day vulnerability detection. When deciding on a vulnerability management...