by Dan Rheault | Mar 6, 2024 | Attack Surface Mapping, Blog, Thought Leadership
Enterprises are not just accumulating a collection of security tools; they are curating a sophisticated platform designed to safeguard their digital assets. The strategic process of selecting these tools is critical, yet it’s just the beginning. The real...
by Dan Rheault | Nov 21, 2023 | Attack Surface Mapping, Blog, Thought Leadership
Attack Surface Management Today The Evolution of Attack Surface Management Tooling The concept of attack surface management (ASM) has evolved from a mere inventory of known assets to a sophisticated discipline that focuses on understanding and securing...
by Dan Rheault | Sep 26, 2023 | Thought Leadership, Vulnerability Management
What is XDR? XDR seeks to integrate data from the IT data sources enterprises have: user data, infrastructure configurations, email, network traffic, workloads, and more. By delivering converged data, XDR aims to provide security teams with a richer, more...
by Dan Rheault | Aug 9, 2023 | Incident Response, New Release, Thought Leadership
Today we share the release of an innovative method for analyzing and understanding a security incident through visualized time series analysis. Our customers’ incident response teams can now specify a point in time to understand a cyber asset and its relationships and...
by Dan Rheault | Jul 20, 2023 | Blog, Thought Leadership
Today’s cybersecurity landscape is increasingly complex with a constantly changing attack surface. The rate of change often obscures cyber assets in their entirety, which presents a growing challenge for organizations seeking to safeguard their critical cyber assets....
by Dan Rheault | Apr 20, 2023 | Blog, Thought Leadership
In the digital age every enterprise heavily relies on technology to manage and grow its business. As technology becomes more complex and siloed, it has become increasingly difficult for enterprises to keep track of all their IT assets. IT asset discovery and...