Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Resource > Research
The cost of cyber-attack on the manufacturing sector is expected to rise globally to $10.5 Trillion. Manufacturers are increasingly at risk of cyber threat, with recent hits on Toyota supplier Denso and the impact of the Russia-Ukraine conflict. Threat actors are casting their gaze on the sector as the growing complexity of...
Resource > Webinar
About this talk In this on-demand webinar, we provide expert insights into the limitation of CVSS and what goes into a vulnerability risk score, including vendor by vendor and what we look at to determine the risk of a vulnerability to help security managers prioritize and make better informed decisions for...
Resource > Datasheet
Discover, assess, and prioritize vulnerability remediation across your networks, and cloud services with Outscan NX.
Resource > Research
In recent years, the credential theft ecosystem has evolved with the increased professionalization of cybercriminal activities. This trend is exemplified through the multiplication of Initial Access Brokers (IABs), the proliferation of ransomware groups, the rise in malware families’ prices, and most importantly, the emergence of Traffers teams. Traffers are organized...
Blog
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is...
Case Study
About the customer A major US sports organization responsible for running live sporting events to thousands of spectators, media, sponsors and TV audiences worldwide leverages Pwn Pulse to secure its wireless airspace, an often overlooked attack surface, at its sold-out stadium events every season. Industry Sport Customer Since: 2019 Industry...
Case Study
About the customer How Outpost24 helped EasySignup achieve continuous security with automated application security testing. Industry Event Management Software Customer Since: 2019 Industry Event Management Software Customer Since: 2019 Services Used The challenge for EasySignup Maintain high availability and avoid business disruption EasySignup provide a web-based application for events managers...
Blog
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this article, we will limit the scope to web applications. Vulnerability...
Blog
Outpost24, a leading innovator in cyber risk management, today announced it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company. Philadelphia, PA, April 24, 2023 - Outpost24, a leading innovator in cyber risk management, today...
page
About OutscanNX OutscanNX integrates threat intelligence scoring to prioritize risks in one intuitive dashboard, allowing you to demonstrate real-time results and progress to stakeholders with solution-based reporting. Stay continuously updated on new threats through scanningless technology and customized notifications, while streamlining security processes and improving efficiency with workflows that reduce...