Darktrace's Cybersprint acquisition allowed the cybersecurity AI vendor to move from focusing solely on internal threats to also defending the external attack surface, Nicole Eagan says. The company says AI will give an outside-in view of the victim and simulate how the attacker will behave.
CrowdStrike has purchased external attack surface management startup Reposify to help organizations detect and eliminate risk from vulnerable and unknown assets. This deal will allow CrowdStrike to combine its insights on endpoints and IT environments with Reposify's internet-scanning capabilities.
From January 1, 2022, to March 31, 2022, Mandiant identified common high and critical severity issues that occurred in medium to large enterprises due to unpatched technologies and configuration drift in internet-facing assets.
Download this report and learn more about:
Exposed data repositories and data...
As digital environments become more dispersed and diverse, it becomes more difficult to track and
monitor every asset, as well as their connections and dependences. In a recent global survey, 75% of C-suite respondents said they worry their enterprises are now too complex to secure.
Attack Surface Management...
Even with custom tools, security teams cannot easily see the entirety of their rapidly expanding attack surface and address its challenges. Legacy sprawl, orphaned infrastructure and an increasingly distributed workforce are ever-present complications.
ASM generates comprehensive visibility of the extended...
Gartner estimates that less than 10% of organizations have adopted one or more attack surface assessment (ASA) technologies to address their attack surface. ASA provides a more comprehensive view of an organization’s asset inventory, including unknowns.
Download this report to gain more insight into:
Improving...
Tech and security leaders have no idea how many cloud services are being used to store sensitive data. Enterprises need continual enumeration of cloud weaknesses and misconfigurations to reduce the risk of data breaches and privacy failures.
Download this report and learn more about:
Platforms providing threat...
The opportunist attacker can find potential victims by simply scanning the internet for assets or services exposed to accidents or misconfigurations. According to our data, risks and exposures are persistent because modern attack surfaces are inherently dynamic, moving, and growing. All too often, this means without...
ASM vendors recognize that most organizations can’t keep up with the rapid changes within their attack surface, robust discovery is a ubiquitous feature of all ASM solutions. From the discovery phase to the reporting and alerting phase, it’s clear that this field has matured rapidly to fill in the gaps.
As...
Existing ASM processes and technologies are a complete mismatch for today’s threat landscape. As part of attack campaigns, cyber-adversaries use automated attack surface scanning tools and work around the clock to find vulnerable systems on enterprise networks.
Download this research report and learn about:
The...
New malware variants are being developed at breakneck speeds, each more sophisticated and devastating than the last. On top of that, successful threats are being commodified by initial access brokers (IAB) and sold as-a-service. Threats are propagating faster than ever with stealthy evasion techniques coded in,...
The traditional security monitoring architecture has been troubling security teams with data silos, performance issues, and delays in retrieving archived data for years. Many analysts who continue to operate with the antiquated SIEM architecture stack also experience a high volume of alerts—with many false...
In this episode of "Cybersecurity Unplugged," Mark Cristiano of Rockwell Automation discusses Rockwell's cybersecurity journey, the particular challenges of deploying cybersecurity in an OT environment, and the minimum and proper industrial protections that organizations need to have in place.
Thoma Bravo halted efforts to buy publicly traded cybersecurity AI vendor Darktrace this week after the two sides failed to agree on the terms of the buyout. The private equity giant walked away from what would have been its third take-private cybersecurity acquisition of 2022.
In the latest "Proof of Concept," VP and CISO Nicole Darden Ford shares findings from Rockwell Automation's new survey report on cybersecurity preparedness in critical infrastructure, OT security gaps, the state of critical infrastructure, and insights into preparedness and best practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.