Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Web Application Security for Chemical Manufacturing
Resource > Research
The cost of cyber-attack on the manufacturing sector is expected to rise globally to $10.5 Trillion. Manufacturers are increasingly at risk of cyber threat, with recent hits on Toyota supplier Denso and the impact of the Russia-Ukraine conflict. Threat actors are casting their gaze on the sector as the growing complexity of...
Risk Based Vulnerability Management: What’s in a Risk Score?
Resource > Webinar
About this talk In this on-demand webinar, we provide expert insights into the limitation of CVSS and what goes into a vulnerability risk score, including vendor by vendor and what we look at to determine the risk of a vulnerability to help security managers prioritize and make better informed decisions for...
RBVM Datasheet
Resource > Datasheet
Discover, assess, and prioritize vulnerability remediation across your networks, and cloud services with Outscan NX.
The Rising Threat of Traffers
Resource > Research
In recent years, the credential theft ecosystem has evolved with the increased professionalization of cybercriminal activities. This trend is exemplified through the multiplication of Initial Access Brokers (IABs), the proliferation of ransomware groups, the rise in malware families’ prices, and most importantly, the emergence of Traffers teams. Traffers are organized...
KrakenLabs’ threat actor naming conventions
Blog
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is...
National Sporting Association
Case Study
About the customer A major US sports organization responsible for running live sporting events to thousands of spectators, media, sponsors and TV audiences worldwide leverages Pwn Pulse to secure its wireless airspace, an often overlooked attack surface, at its sold-out stadium events every season. Industry Sport Customer Since: 2019 Industry...
EasySignup
Case Study
About the customer How Outpost24 helped EasySignup achieve continuous security with automated application security testing. Industry Event Management Software Customer Since: 2019 Industry Event Management Software Customer Since: 2019 Services Used The challenge for EasySignup Maintain high availability and avoid business disruption EasySignup provide a web-based application for events managers...
Penetration testing vs vulnerability scanning: What’s the difference?
Blog
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this article, we will limit the scope to web applications. Vulnerability...
Outpost24 expands leadership team by appointing Brendan Hogan as Chief Strategy Officer
Blog
Outpost24, a leading innovator in cyber risk management, today announced it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company. Philadelphia, PA, April 24, 2023 - Outpost24, a leading innovator in cyber risk management, today...
Risk-based Vulnerability Management
page
About OutscanNX OutscanNX integrates threat intelligence scoring to prioritize risks in one intuitive dashboard, allowing you to demonstrate real-time results and progress to stakeholders with solution-based reporting. Stay continuously updated on new threats through scanningless technology and customized notifications, while streamlining security processes and improving efficiency with workflows that reduce...