Organizational attack surfaces are expanding, giving attackers bigger targets to hit. It’s a sneaky battle and one that organizations have to fight. By understanding the attack surface, expanding your intelligence capabilities, and getting to know the enemy, you’ll be prepared for the fight ahead.more →
Adding Profound Value to Security and Risk Functions
Defending your organization’s attack surface in today’s threat landscape is a global-scale challenge full of continuously changing elements.
Attacker tools have flooded the web, and advanced adversaries target massive vulnerabilities in ubiquitous systems used across the world.more →
SolarWinds: Illuminating the Hidden Patterns That Advance the Story
Below we share an article by Team Atlas updating us on the SolarWinds story and the vital role of RiskIQ.
Though the Russian espionage campaign that compromised the SolarWinds supply chain is progressing, public-facing research into the campaign seems to have stopped.more →
Every year we become more mobile-centric and during 2020 the pandemic accelerated that growth. At the same time attacks on mobile devices are increasing and are often very different from those in a desktop computer world. News about new mobile threats is a regular occurrence and will only increase. But that is not the only mobile security issue we face.more →
Frankly, it’s a tough time to be in cybersecurity. Perhaps the toughest ever. There have been over a dozen zero-days in the past three months alone, with countless organizations across the world affected.
We’re barely four months removed from SolarWinds—a watershed attack some thought would set the standard for the impact a vulnerability could have—and already dealing with a new attack that dwarfs it in scale.more →
Attack Surface Management (ASM) is an important part of your security profile, but before we get into exactly why you need it let’s just cover off what an Attack Surface is.
What is a cyber-attack surface?
An organization’s total attack surface is all the exploitable vulnerabilities that you have on your network (these can be both known and unknown).more →