Attack Surface Assessment tools enable information security teams to look at their organizations “outside-in” from the attacker’s point of view, prioritizing the issues that attackers...
Gartner’s Critical Insights for External Attack Surface Management (EASM) Solutions
Attack Surface Assessment tools enable information security teams to look at their organizations “outside-in” from the attacker’s point of view, prioritizing the issues that attackers...
The Modern Attack Surface is Digital and External In the past, the attack surface was defined and protected by the boundaries of the organization’s physical network (aka the LAN)....
In business and life, getting the timing and the team right is half the battle. Getting Started Cyberpion came out of stealth mode 18 months ago. During those 18 months, the...
(Originally Posted on Forbes.com) Anyone who’s ever been in a relationship knows that the beginnings and ends are the toughest parts. This is when the baggage is dusted off,...
On Thursday, December 9, a zero-day vulnerability CVE-2021-44228 (a.k.a. Log4Shell, LogJam, and Log4j) was made public. This vulnerability impacts Apache Log4j versions 2.0-beta9 to...
Cyber Monday and the holiday shopping season are around the corner: don’t be the victim of an online shopping scam or cyber security breach. Cyber Monday is here, and the holiday...
Neglecting to address third-party vulnerabilities can cause widespread problems for your organization, the third party, and possibly every one of the third party’s customers, which is why...
As more enterprise clients adopt Cyberpion as their External Attack Surface Management solution, we are seeing a distinct, bimodal pattern with regard to the workflows and processes used to...
Customer trust is one of the greatest assets an enterprise can have. However, a rising trend in cyberattacks combined with lax oversight of a critical attack vector may put your...
Physical vs Software vs Digital Supply Chain Vulnerabilities The concept of a supply chain has been around since the 1920s. Fast-forward to today, the term "supply chain" has been co-opted...
We are happy to announce that Cyberpion’s Security platform has achieved IP Co-Sell Ready Status and is now available via the Microsoft Azure Marketplace. Access Cyberpion via the Azure...
A few months ago, Cyberpion approached EA with an ethical disclosure of several security vulnerabilities. EA was informed of the following during that disclosure: that via a trusted...
What Is An External Attack Surface? While there has been no shortage of headlines regarding cybersecurity events for the past many years, the recent SolarWinds incident highlights the...
In many recent conversations with family, friends, colleagues and even people in the socially distanced line at the grocery store, I keep talking about external attack surfaces as an...
Third-Party Attacks Will Increasingly Push Government Agencies To Rigorously Evaluate Online Vendors The recent SolarWinds supply chain attack that targeted several U.S. government...
It took stealing the crown jewels of one of the leading cyber security companies – the offensive hacking tools of FireEye – for anyone to detect what’s shaping up to be...
On top of a challenging economic year, retailers, e-tailers, and their customers face a growing threat this holiday season: the rise in cyberattacks. While businesses have lived with this...
Cloudification has been taking over IT in the past decade and has been a huge factor in the explosion of the size of companies’ online ecosystems and the types of risks that exist...
Several months ago, I was introduced to Cyberpion and the concept of the external attack surface that exists in an organization’s external attack surface. I have worked in cybersecurity...
We are about one week away from the U.S. election and a lot is at stake for both parties. While the political pundits are focused on polling numbers and predictions, at Cyberpion we are...
The Days of Monolithic Webservers are Long Gone Practically any public webpage now loads multiple pieces of content, from multiple sources. In fact it’s now not uncommon to find...
Why Cyberpion? Why Now? My team and I founded Cyberpion with one goal in mind: to answer the critical and growing need for organizations to secure their online ecosystems. The primary...
See the risks you’re exposed to with a vulnerability assessment.