Author: Ben Kapon

Attack Surface Management
Why Attack Surface Assessment Tools Are Vital According to Gartner

Why Attack Surface Assessment Tools Are Vital According to Gartner

April 26, 2022

Attack Surface Assessment tools enable information security teams to look at their organizations “outside-in” from the attacker’s point of view, prioritizing the issues that attackers...

Digital Attack Surface – The Top 7 Vulnerabilities You Need to Know

Digital Attack Surface – The Top 7 Vulnerabilities You Need to Know

April 12, 2022

The Modern Attack Surface is Digital and External In the past, the attack surface was defined and protected by the boundaries of the organization’s physical network (aka the LAN)....

Apache Log4j Vulnerability CVE-2021-44228 – How to discover and minimize your exposure

Apache Log4j Vulnerability CVE-2021-44228 – How to discover and minimize your exposure

December 13, 2021

On Thursday, December 9, a zero-day vulnerability CVE-2021-44228 (a.k.a. Log4Shell, LogJam, and Log4j) was made public. This vulnerability impacts Apache Log4j versions 2.0-beta9 to...

10 Ways to Avoid Online Shopping Scams on Cyber Monday and Beyond

10 Ways to Avoid Online Shopping Scams on Cyber Monday and Beyond

November 29, 2021

Cyber Monday and the holiday shopping season are around the corner: don’t be the victim of an online shopping scam or cyber security breach. Cyber Monday is here, and the holiday...

Remediation vs. Mitigation — Third-Party Vulnerability Management

Remediation vs. Mitigation — Third-Party Vulnerability Management

October 3, 2021

Neglecting to address third-party vulnerabilities can cause widespread problems for your organization, the third party, and possibly every one of the third party’s customers, which is why...

A Primer On External Attack Surface Management

A Primer On External Attack Surface Management

August 8, 2021

Customer trust is one of the greatest assets an enterprise can have. However, a rising trend in cyberattacks combined with lax oversight of a critical attack vector may put your...

Three Types of Supply Chain Attacks Explained

Three Types of Supply Chain Attacks Explained

July 26, 2021

Physical vs Software vs Digital Supply Chain Vulnerabilities The concept of a supply chain has been around since the 1920s. Fast-forward to today, the term "supply chain" has been co-opted...

Cyberpion Available On Microsoft Azure Marketplace

Cyberpion Available On Microsoft Azure Marketplace

July 7, 2021

We are happy to announce that Cyberpion’s Security platform has achieved IP Co-Sell Ready Status and is now available via the Microsoft Azure Marketplace. Access Cyberpion via the Azure...

Let Us
Show You.

What Do You Really Know About The
Security Posture Of Your External Attack Surface?

See the risks you’re exposed to with a vulnerability assessment.