Category: Reposify

"While Zero Trust enables secure communications in-office, EASM can help reflect what is exposed in real time and provide a clear list of external facing applications, users, remote connections and network infrastructure identified" Our Director of Security Research Dor...
Attack Surface Management
SSL certificates are essential to encrypting internet traffic and verifying server identities. In spite of the available certificate management tools, cyber incidents related to expired SSL certificates are on the rise, suggesting that managing SSL certificates may not...
Expired Certificates
EASM touches nearly every corner of a strong cybersecurity posture. With solutions abound, we've handpicked H1 2022's top articles on EASM....
Attack Surface Management
In April, VMware issued a series of patches to guard against vulnerabilities in a number of products. Among the most critical is CVE-2022-22954, a remote code execution RCE threat that puts organizations at risk of cyber attack. Only EASM...
Attack Surface Management
Microsoft covered more than 100 vulnerabilities in April's security update, among them patches to critical remote code execution (RCE) vulnerabilities located in Microsoft’s SMB. In response Reposify's EASM platform scanned and identified 800,000+ nodes with open SMB...
Attack Surface Management
If you are using Shodan to search for your company’s assets or perform reconnaissance as part of blue or red teams routines - you need to keep reading....
External Attack Surface Management
Many organizations don’t realize that as they move mission-critical operations to the cloud, they also lose visibility into their assets. The answer lies in learning how to improve IT asset management. ...
There are many ways to keep your assets secure, but building a foundation and mapping your assets to protect your external attack surface as the first line of defense is a solid start. ...
ciso
We hosted a session showcasing just how vulnerable the external attack surfaces of the majority of the financial industry really is, it wasn't good. ...
Cyber Security
This blog provides a deep dive into the different types of visibility provided by some of the most dominate services in the cybersecurity market...
risk visibility