Blog

Topics

A Practical Checklist to CTEM
Batya Steinherz | Blog

There’s a lot of hype around Gartner’s Continuous Threat Exposure Management (CTEM). But CTEM isn’t a specific technology or a category of solutions. Instead,…

The GenAI Train has Left the Station: It’s Time to Secure the Tracks
Dan Anconina | Blog

  The adoption of generative AI in business introduces significant security and privacy risks. The ability to create convincing fake content and deep fakes…

The Anatomy of a Healthcare Cyberattack: Two True Stories
Michael Lavengood | Blog

It’s no secret that the healthcare industry is a prime target for attackers. According to research from Check Point, healthcare organizations worldwide were attacked…

The Cloud is Just Half the Problem
Matthew Quinn | Blog

With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals. And not so surprisingly,…

Top 10 Favorite Cybersecurity Podcasts
Shahar Solomon | Blog

As a cybersecurity professional, it’s important for me to stay current and on top of trending events. But to be honest, the cyber world…

Why Focusing on Choke Points Can Help Solve Your Resource Constraints
Michael Greenberg | Blog

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult and overwhelming (to say…

IT and Security – A Love Story
Batya Steinherz | Blog

The Montagues and the Capulets. The Sharks and the Jets. Security and IT. Some rivalries are well-known to be irreconcilable. But the thing is,…

CVE-2023-23397 – Outlook vulnerability
Zur Ulianitzky & David Azria & Bill Ben Haim | Blog

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs within Microsoft products. Exploiting…

CVE 2023-21716- Microsoft Word RCE
Zur Ulianitzky & David Azria & Bill Ben Haim | Blog

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was patched during February 2023…

Identity-based Exposures – 4 Ways to Prevent Them
Karin Feldman | Blog

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today, one of the most…

Continuous Compliance:

Where Security’s Rubber Meets Compliance’s Road

Shimon Becker | Blog

How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are actually two sides of…

How Financial Services Institutions Are Tackling Continuous Exposure Management
Ian Gallagher | Blog

Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4 times they uncovered attack…

1 2 3 21

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.