Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2022

Why Continuous Attack Surface Management is No Longer Optional

From Executive Orders to cyber insurance and evolving regulations, security teams are entering the age of evidence. Want to do business with a government entity? You must demonstrate adherence to zero-trust principles. Want cyber insurance? You need documentation of your entire attack surface. Want to conduct financial services business in various regions? Show your operational resiliency.

It's time to change the playbook: Prepare for uncorrelated surprises

Investors came into 2022 feeling good, with a three-year average annual return for the S&P 500 of 24%. In March, things changed. The Federal Reserve raised interest rates, signaling it was time to switch to bonds. The playbook said bonds were the much safer play. Then Russia invaded Ukraine. Commodity prices, especially energy and food, spiked. Supply chains broke. The E.U. faced a winter without enough energy to heat homes or power businesses.

What's Hiding in Your External Attack Surface?

Cybersecurity teams need to develop and maintain a set of practices around their online attack surface. These practices must include attack surface visibility and mapping of third-party connections as well as constant assessment of the risks of these connections. Controls must include the ability to detect and alert on risky or broken connections, coupled with automated remediation when feasible.