The External Attack Surface Blog

Get the latest news and best practices on how to deal with new vulnerabilities, asset exposure trends, industry benchmarks and all things cybersecurity.

While there are many different ways attackers can access your IT systems, most cyberattacks rely on similar techniques. Read about some of the most common methods of cyber-attacks - from the attacker's point of view. 
Attack Vectors
Organizations see an unprecedented increase in the appearance of shadow IT over the past few years. What are the main security risks and financial implications you should prevent?
Shadow IT
There are many ways to keep your assets secure, but building a foundation and mapping your assets to protect your external attack surface as the first line of defense is a solid start. 
We hosted a session showcasing just how vulnerable the external attack surfaces of the majority of the financial industry really is, it wasn't good.
Cyber Security
This blog provides a deep dive into the different types of visibility provided by some of the most dominate services in the cybersecurity market
risk visibility
PCI security compliance alone does not guarantee protection against advanced cyberattacks.
Digital certificates are a cornerstone in building a trust-based relationship between your business and your customers.
Expired Certificates