Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Build a modern threat intelligence program based in automation Ansh Patnaik, Chief Product Officer at CyCognito There is a change underway in terms of how Security teams validate potential exploits using threat intelligence. Until very recently, most Security te... March 23, 2023 5:00pm Attack Surface Management: Improve your cyber resiliency Andrew Pettet, Mandiant Sales Engineer, Jay Christiansen, Mandiant Red Team Consulting Manager How do you find and protect all of your external-facing assets? Is your attack surface vulnerable to attack? What do the hackers see? With new advan... March 30, 2023 9:00am How To Overcome Active Directory Exploits And Prevent Attacks Shira Bendkowski Director of Product Management at XM Cyber According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threat... 1 week ago | 44 mins 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... 2 weeks ago | 44 mins A Demo of Vulnerability Risk Management Data Aggregation and De-duplication Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Sherlock Holmes said, "It is a capital mistake to theorize before one has data." Enterprise vulnerability management teams know exactly what Sherlock ... March 30, 2023 4:00pm Mind the gap: How to find, prioritize, & manage vulnerable assets Karl Klaessig and Mike Plavin of ServiceNow Many organizations and their security teams are overwhelmed trying to keep up with vulnerabilities and cyber threats. Not only is prioritization a cha... 1 week ago | 53 mins 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... 4 weeks ago | 44 mins Enable your security team to build better remediation partnerships Anne Marie Zettlemoyer, Chief Security Officer at CyCognito, and Mike Johnson, Co-host of the CISO Series podcast One of the largest challenges for Security professionals and leaders is to create sustainable operational workflows to remediate critical risks. Secur... 2 weeks ago | 31 mins Improve attack surface visibility while reducing false positives Meir Asiskovich, VP of Product, CyCognito As enterprises scale, they can easily expect to encounter many supposed security issues creating an unwieldy level of noise. These alerts can affect a... 4 weeks ago | 45 mins Outsmart Cybercriminals with Proactive Attack Surface Management Michiel Prins and Naz Bozdemir, HackerOne 52% of security-conscious enterprises in a recent HackerOne survey don’t know how much of their attack surface is secured, and not one respondent was ... 1 month ago | 60 mins Load more