Ordr GitHub satellite cyberattack Strontium cyberwarfare counter-drone The Legality of Waging War in Cyberspace

Ordr Taps AI to Augment Attack Surface Management

Ordr this week added an attack surface management (ASM) tool infused with artificial intelligence (AI) to its existing asset management portfolio ...
Security Boulevard
IONIX software supply chain, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

IONIX ASM Platform Adds Testing Tools to Simulate Cyberattacks

IONIX extended its ASM platform to include the ability to use simulations to conduct tests without disrupting production environments ...
Security Boulevard
cloud attack surface management

Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?

The cloud revolutionized how businesses operate, but with increased flexibility comes an expanded attack surface. Traditional security methods struggle to keep pace with the dynamic nature of cloud environments, making... The post ...
How to Protect Your Website from Subdomain Takeovers?

How to Protect Your Website from Subdomain Takeovers?

For many businesses, websites are the cornerstone of their online identity, driving brand awareness, customer engagement, and revenue. But what if, unknowingly, you’ve created a vulnerability that could expose your... The post ...
use case strobes asm

Use Case: Rapid Identification and Escalation of a Critical Threat by Strobes ASM

| | ASM, Strobes ASM, use case
Introduction In a recent critical incident, Strobes ASM, an attack surface management platform, played a key role in identifying and mitigating a severe threat in a custom-made WordPress application. The... The post ...
attack surface categories

Attack Surface Management: What is it? Why do you need it?

| | ASM, Attack Surface Management
Traditional asset inventory and vulnerability management software can’t keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates... The post ...
COVID-19 Keeper Security work JumpCloud remote working work contact center

Limiting Remote Access Exposure in Hybrid Work Environments

With the rise in remote and distributed work, companies find it increasingly difficult to manage their attack surface at the speed and scale necessary to prevent cyberattacks ...
Security Boulevard
decoding

Integrating Attack Surface Management and Penetration Testing as a Service

| | ASM, pentesting, Thought Leadership
Introduction In this extensive dive, we’re going to explore the intricacies of Attack Surface Management (ASM) and Penetration Testing as a Service (PTaaS), two critical components in the cybersecurity arsenal.... The post ...
external attack surface management

Understanding External Attack Surface Management (EASM)

| | ASM
Businesses are facing an ever-increasing array of cybersecurity challenges. The rise of cyber threats, vulnerabilities, and the expansion of attack surfaces have made it imperative for organizations to gain comprehensive... The post ...
ASM, CTI,

Battling Cybercrime by Combining ASM With CTI

Organizations are increasingly turning to attack surface management (ASM) and cyberthreat intelligence (CTI) as essential components of their cybersecurity programs ...
Security Boulevard