Resources

What is Risk Exposure?

Risk exposure is a quantification of the vulnerability of an individual, organization, or asset to adverse events or uncertainty. It can show how susceptible…

Keep Your Eye on the Ball: Leveraging Attack Paths to Achieve CTEM Goals
Mark Jaffe | August 18, 2023

It’s summer and I’m a baseball fan, so please excuse the extended metaphor. Let’s start with some chilling stats: some 70% of companies suffered…

In-House Expert Roundup: Top 18 Cyber Upskilling Resources
Batya Steinherz | August 13, 2023

In today’s dynamic cyber landscape, the importance of continuing cyber education – “upskilling” in tech lingo – cannot be overstated. Cyber upskilling empowers professionals…

What is Continuous Threat Exposure Management (CTEM)

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of…

Want to Fix Exposure Management? Stop Wasting Time on the Wrong Things
Michael Greenberg | August 03, 2023

There’s a lot of talk about how to make the most of what you’ve got, especially in light of the less-than-amazing economic situation at…

10 Tips to Get Buy-in From Your CFO for Security Projects
Gali Rahamim | July 27, 2023

  Everyone agrees that cybersecurity is important – but it’s always been and remains a tough budgetary sell. Even today, with cybersecurity firmly on…

10 Tips to Get Security and Non-Security Teams on the Same Page
Batya Steinherz | July 25, 2023

  Some rivalries are well-known to be irreconcilable – like The Montagues and the Capulets, or  The Sharks and The Jets. Here’s another well…

Economy’s Crummy? Here’s How to Leverage it for Better Security Posture 
Uri Levy | July 20, 2023

  Companies are like governments – and people, for that matter: when times are good, they tend to expand. When there are extra tax…

CVE-2023-36884 – Nation-State RCE Targets Government Agencies with Malicious Microsoft Office Documents
David Azria & Batya Steinherz |

Updated on 27/07/2023 On July 11th, Microsoft announced they had uncovered a zero-day bug found in numerous Windows and Office products with a criticality…

Must-Have Expert Tips & Tricks to Implement Your CTEM Program
Michael Greenberg | July 13, 2023

Happy birthday to CTEM!  It’s been a year since Gartner first mentioned Continuous Threat Exposure Management (CTEM) in their foundational report Implement a Continuous…

10 Hot Cybersecurity Tips to Keep Your Employees Stay Safe This Summer
Batya Steinherz | July 05, 2023

Summer’s here – true, not everywhere, but if you live in the upper half of the world map, it’s probably pretty sunny and hot…

Almost Two Decades Later: Why is the Cloud Still the Wild West?
Dan Anconina | July 02, 2023

As a movie genre, Westerns tend to be long…very long, often. But there’s one Wild West show that’s been going on for nearly two…

1 7 8 9 10 11 37

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.