GET A DEMO

A comprehensive guide to DORA and NIS2 compliance

A comprehensive guide to DORA and NIS2 compliance Get access now About this whitepaper This white paper provides an in-depth exploration of the Digital Operational Resilience Act (DORA) and the Network and Information Systems Directive (NIS2), pivotal regulatory frameworks established by the European Union to bolster the resilience of its financial and critical sectors against… Continue reading A comprehensive guide to DORA and NIS2 compliance

Attack surface management: A practitioner’s guide

Attack surface management: A practitioner’s guide Get access now About this whitepaper This white paper delves into the intricacies of attack surface management (ASM). It discusses how the concept of the attack surface—the total number of potential attack points within an environment—has evolved with the expansion of digital footprints. It addresses the challenges security teams… Continue reading Attack surface management: A practitioner’s guide

2024 vulnerability watch

Q3 2023 vulnerability watch

The difference between legacy and modern vulnerability management

white paper The difference between legacy and modern vulnerability management In terms of the endgame, security teams all share the same goal: drive down risk and keep organizations secure from data breaches. But it’s in the approaches they take to getting there that we see different attitudes. This stems from fundamental distinctions between legacy and… Continue reading The difference between legacy and modern vulnerability management

Vulnerability management then and now – a brief history

White paper Vulnerability management then and now – a brief history Recent cyber security breaches never fail to shine a light on our shortcomings in vulnerability management and cyber risk management. It is time to learn from the past and come to grips with the fact that we can do more to protect organizations through… Continue reading Vulnerability management then and now – a brief history

The top five mistakes everybody makes in vulnerability management

The top five mistakes everybody makes in vulnerability management Get access now About this whitepaper Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. But moving from vulnerability management to cyber risk management isn’t easy. There are so many moving parts, with dozens of stakeholders, and infrastructure and attack surfaces… Continue reading The top five mistakes everybody makes in vulnerability management

Cloud security risks in 2022

An introduction to exploit maturity

SANS vulnerability management survey 2022