Blog

Stay up to date on cybersecurity

BLOG
In recent years, the concept of¬†attack surface management has begun to gain traction. When executed correctly, it can dramatically strengthen your security posture and reduce the odds of a serious data breach. If you’re unfamiliar with the basics, let’s start with a quick review. What is an Attack Surface? The attack surface of a software […]
Managing cybersecurity vulnerabilities is enough to make anyone feel under siege. In recent years there have been anywhere from 30-40 new vulnerabilities released daily, which means that security teams have been inundated with new threats and prioritization challenges. The fact that legacy vulnerability management (VM) products can no longer keep up with expanding attack surfaces […]
Tagged under: ,
Cloud Security Masterclass
REGISTER NOW The world is moving at an incredible pace to keep up with the speed of business. 90% of enterprises will be leveraging multi-clouds by 2022. With heavy pressures on accelerating digital transformation due to the COVID-19 pandemic, the adoption and securing of cloud environments is more urgent than ever. As we all embrace […]
Cloud platforms such as Amazon Web Services (AWS) have transformed how we do business. They allow organizations access to highly scalable and flexible computing architecture for a fraction of the cost of a fully in-house solution. However, as organizations migrate to the cloud with record speed, security sometimes falls by the wayside. The complexity of […]
Tagged under: , ,
You can’t understand modern cybersecurity without a good grasp of attack paths. With that said, let’s take a closer look at why attack paths are so important for defenders and the best way to manage them. Understanding Attack Paths and Attack Surfaces An attack path combines a chain of vulnerabilities, misconfigurations, overly permissive identities or […]
Hybrid Cloud Security Best Practices
Hybrid cloud computing is a “best of both worlds” approach made up of on-premises infrastructure, private cloud services, and a public cloud – such as Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) – with orchestration among the various platforms.¬† Additionally, from a pure security perspective, hybrid cloud setups can also allow […]
Sisyphus, a famous king from Greek mythology, was known for being crafty. He cleverly used deceit and trickery to twice cheat death. Zeus and the rest of the gods, however, were not amused. They decided to punish Sisyphus by forcing him to roll a boulder up a hill. Every time Sisyphus neared the top, the […]
Here‚Äôs something that should send a shiver down the spine of cybersecurity professionals and business leaders: The odds say that your organization will be victimized by a ransomware attack in the next 12 months. In 2021, the global ransomware victimization rate for businesses reached 68.5-percent, according to Statista. This is the highest figure in history. […]
Double extortion ransomware attacks are now one of cybersecurity’s most pressing threats. Read this to learn how organizations can make the right moves to protect their most sensitive assets. Ransomware attacks have long been viewed as a worst-case cybersecurity scenario for organizational leaders. Sadly, that doomsday scenario is now becoming reality with alarming frequency.¬†In 2021, […]
By providing critical attack-centric context, XM Cyber helps extend the power of Tenable‚Äôs cyber exposure platform Like peanut butter and jelly, some things are good in isolation but great when they are combined. In the world of cybersecurity, joining the power of two advanced technologies together often delivers similar improvements. By integrating one platform into […]