Author: Ran Nahmias

Third Party Attacks
Vulnerability Management
Remediation Vs. Mitigation — Third-Party Vulnerability Management

Remediation Vs. Mitigation — Third-Party Vulnerability Management

June 4, 2021

Neglecting to address third-party vulnerabilities can cause widespread problems for your organization, the third-party, and possibly every one of the third-party’s customers, which is why...

Introducing Cyberpion’s Ecosystem Security Partner Program

Introducing Cyberpion’s Ecosystem Security Partner Program

June 4, 2021

What Is An Ecosystem? While there has been no shortage of headlines regarding cybersecurity events for the past many years, the recent SolarWinds incident highlights the risks inherent in...

A Tale Of Ethical Disclosures

A Tale Of Ethical Disclosures

June 4, 2021

In many recent conversations I keep talking to family, friends, colleagues and even people in the socially distanced line at the grocery store, about online ecosystem as an emerging (and...

U.S. Retailers: How A Grinch Will Steal Your Holiday This Year

U.S. Retailers: How A Grinch Will Steal Your Holiday This Year

June 4, 2021

On top of a challenging economic year, retailers, e-tailers, and their customers face a growing threat this holiday season: the rise in cyber-attacks. While businesses have lived with this...

The Cybersecurity Industry Is Waking Up To The Online Ecosystem Attack Surface

The Cybersecurity Industry Is Waking Up To The Online Ecosystem Attack Surface

June 4, 2021

Several months ago, I was introduced to Cyberpion and the concept of the attack surface that exists in an organization’s online ecosystem. I have worked in cybersecurity for many, many...

Election Ecosystems, How The Two U.S. Political Parties Stack Up

Election Ecosystems, How The Two U.S. Political Parties Stack Up

June 3, 2021

We are about one week away from the U.S. election and a lot is at stake for both parties. While the political pundits are focused on polling numbers and predictions, at Cyberpion we are...

Let Us
Show You.

What Do You Really Know About The
Security Posture Of Your Digital Ecosystem?

See the risks you’re exposed to with a vulnerability assessment.