News

Topics

What’s the scoop on cyber threat hunters?

XM Cyber announced findings from its third annual State of Exposure Management Report, produced in collaboration with the Cyentia Institute, which found that identity and…

RSA Conference 2024 – Announcements Summary

Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.

XM Cyber: How This Hybrid Cloud Security Company Is Closing the Exposure Remediation Gap

XM Cyber is a leading hybrid cloud security company changing how organizations approach cyber risk. Pulse 2.0 interviewed XM Cyber Chief Technology Officer and…

XM Cyber Introduces First Exposure Management Solution Working Across Environments

XM Cyber, a leader in hybrid cloud exposure management, announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes…

Securing Active Directory and Azure AD

For more than two decades, Active Directory (AD) has been the default identity and access management service in Windows networks. As enterprises have shifted to the…

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

CyCognito has released its semi-annual State of External Exposure Management Report, revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive…

Report Reveals Alarming Cloud Misconfiguration and Exposed Assets

In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…

Diagnostic fatigue is causing havoc on cyber efficiency

We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…

20 Hottest New Cybersecurity Tools At Black Hat 2023

At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…

Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity

The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…

What is cloud security? Fundamental guide

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…

1 2 3 21

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.