CAASM
CAASM: Dead-End Approach or Worthwhile Journey?
Cyber Asset Attack Surface Management (CAASM) is focused on enabling security teams to overcome asset visibility. Asset visibility is foundational to security programs — knowing what assets exist in their environment and ...
Noetic’s acquisition by Rapid7: Giving our customers more comprehensive visibility of their attack surface
Today is a significant day in Noetic Cyber’s history, as we announce our upcoming acquisition by Rapid7. This is not the end of the Noetic story, but our vision and technology will ...

Noetic Cyber™ and Infoblox: How Network Infrastructure Information Can Unlock More Visibility in Your CAASM Platform
Organizations face increasing challenges in maintaining a comprehensive and up-to-date cyber asset inventory. Doing so can take many organizations more than 80 hours to complete, each time—if they are even able to ...

What’s New in the 2024 Gartner® Innovation Insight: Attack Surface Management
Despite many advancements made over the past few years, we believe that many challenges around attack surface and exposure management remain true: “Organizations have to manage a growing attack surface as their ...
Balbix Guide to XZ Utils Backdoor
Executive Summary On March 29, 2024, developer Andres Freund reported the discovery of a backdoor in XZ Utils, affecting v5.6.0 and 5.6.1. XZ Utils, which provides compression tools for the .xz format, ...
Understanding Your Attack Surface: AI or bust
Creating an accurate inventory of an organization’s assets and applications while ensuring no duplicates or omissions is essential for any IT and security program. Security teams must understand vulnerabilities associated with their ...
Understanding the Need for Cybersecurity Asset Management
Conventional attack surface management strategies are proving ineffective, despite the increasing reliance on cybersecurity as a core business function. Discover the five reasons why organizations are embracing cybersecurity asset management. Cybersecurity is ...
Attention CISOs: The Cybersecurity Metrics That Truly Matter
Successful business leadership is about effective risk management. And successful risk management starts with having the right data to hand. For the chief information security officer (CISO), this means regularly gathering and ...

MOVEit Hack: What went wrong, and how to course correct
What the MOVEit Breach Tells Us About the Challenges of Patching On May 31, 2023, little-known software developer Progress Software published details of a critical vulnerability in MOVEit Transfer, a popular managed ...
Best Practices for Selecting the Right CAASM Tool
Cyber Asset Attack Surface Management (CAASM) has emerged as a foundational technology to help security teams address their exposure management challenges. As the organization’s attack surface continuously expands, a CAASM solution plays ...