Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
page
Responsible Disclosure Policy True to our security researcher roots, Outpost24 takes a serious view of responsible disclosure. We understand the importance of security, privacy and the value of the security research community. Our goal is to help our customers and the public make the best-informed decisions to secure their systems,...
page
Lifecycle Policy The Outpost24 Lifecycle Policy covers products and services that are serviced and supported continuously. Under this policy, the product or service remains in support if the following criteria are met: Customers must have a valid agreement to use the product or service with Outpost24 or its partners Customers...
page
Explore all certifications & cybersecurity standards Other Certifications Other Certifications CCNA CEH CESG CHECK CISA CISSP CNAP CompTIA CSIT Forensics HISPASEC Team Leader ITIL v3 NATO F100 OSCP OSCE OSWE OSWP PCI ASV Security+ Team Leader CRPT CCNA CEH CESG CHECK CISA CISSP CNAP CompTIA CSIT Forensics HISPASEC Team Leader...
page
Customer Support Service Description Outpost24 Customer Support is aimed at building competent and sustainable customer success. We want our customers and partners to have the best prerequisites for being successful in their Cyber Security Resilience. This page contains information about our Customer Support offerings. This service description (“Service Description”) should...
Resource > Webinar
About this talk Threat actors are constantly evolving their tactics and techniques behind the scenes to target new flaws in the attack lifecycle and infiltrate company infrastructure. While most organizations are already performing vulnerability management based on the CVE registry by MITRE, few have considered the powerful correlations between CVEs...
Resource > Webinar
About this talk Penetration testing has long been a tried and tested method to simulate attack against companies’ IT systems to find exploitable vulnerabilities before anyone does. Whilst a pen test can expose critical security issues, it doesn’t help a company build up the knowledge and expertise to prevent all...
Resource > Webinar
About this talk Credit card fraud can be extremely damaging for brand reputation and can lead to millions in stolen cash from threat actor gangs. The outcomes of such cybercriminal operations reinforce the importance for industries handling customer and employee data to secure it and ensure PCI DSS v4.0 (Payment...
Resource > Webinar
About this talk Web application testing can take a lot of effort and still not providing the results your business need. In the face of an ever growing digital attack surface and agile release cycles, traditional pen testing is not enough. You need a combination of automated scanning and manual...
Resource > Webinar
About this talk In this on-demand webinar, Outpost24’s Thomas Stacey will walk you through a vulnerability he recently discovered in Azure's API Management Developer Portal that can be exploited to perform an account takeover attack. Thomas will be exploring the various steps involved in identifying the vulnerability, disclosure and eventual...
Blog
LONDON, UK, 7 June, 2023 – Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic. Based in Leuven (BE), Sweepatic is an innovative external attack surface management (EASM) platform. Gartner identified EASM as a top Security and Risk Management (SRM) trend for 2022. By leveraging their...