Darktrace acquires Cybersprint. Read the press release>
x
Attack surface management is the solution to some of the most complex challenges. Read more
Mapping Digital footprint & DRPM to Mitre Pre-Att&ck. Read more
We believe attack surface management is key in solving digital problems. Read more
downloads
In this webinar, we talk about the threats of open directories, our research and how to protect your organisation.
Discover what is needed to prepare your organisation for continuous improvement of digital security and how you can involve ethical hackers in this process.
Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process.
Knowing your attack surface is essential for managing digital risk & protecting your organisation. Read more about attack surface management in this flyer.
Het GGI-Veilig framework maakt de beveiligings-eisen inzichtelijk voor gemeenten, waterschappen en provincies. Hoe werkt het? En hoe helpt ASM? Lees het hier.
In this whitepaper, CISO Vincent Thiele takes a look at the challenges and best practice to manage and control your attack surface.
API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.
Focusing on one risk type over others will leave you with blind spots elsewhere in your attack surface. In this video, we explain how attack surface management provides your organisation with the insights you need to reduce your risk exposure.
It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.
Cybersprint Newsletter
Do you have a question?