Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OutscanNX: Reduce alerts and remediate what matters with RBVM

Last year, nearly 60% of cyber compromises were directly attributable to unpatched vulnerabilities – flaws that organizations knew about but hadn’t remediated in time. The problem with traditional vulnerability management (VM) approaches is they treat every finding equally, leaving security teams drowning in noise and fighting to sort serious risks from low-level tasks. This is where Risk-Based Vulnerability Management (RVBM) comes in.

CMMC Explained: A High-Level Look at Common Terms and Definitions

The Cybersecurity Maturity Model Certification (CMMC) program went live on Oct 15th, 2024 with the publication of the 32 CFR Part 170, “Final Rule”. CMMC is the framework designed by the Department of Defense (DoD) to enforce the protection of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared with government contractors, subcontractors and suppliers across the defense industrial base.

MDR vs SIEM: Which is Right for Your Organization?

The decision to buy a Security Information and Event Management (SIEM) product or outsource to a Managed Detection and Response (MDR) depends on a number of factors, including the size of your organization, the complexity of your IT infrastructure, and your overall security needs. Before we get into the main discussion, let’s step back and define what we are talking about so everyone is on the same page.

Avoid FedRAMP Delays: 7 Common SSP Mistakes to Fix

Seeking a FedRAMP authority to operate is a critical part of any cloud service looking to work with the government in an official capacity. It’s required if you are going to handle controlled unclassified information on behalf of the government or its contractors, and since the requirements trickle down, you don’t even necessarily have to be part of the government’s prime contractors to need your ATO.

The Hidden Stress of Being a SOC Analyst. Nobody Talks About This

"You feel the weight of the organization on you" - Grant Oviatt reveals the emotional reality of being a SOC analyst that nobody talks about. When you find something bad, there's that panic moment of "what do I do?" while knowing the entire organization depends on your response speed. This is why AI agents providing instant remediation actions can be a game-changer for analyst mental health and response times.

Client-Side Exploitation Attack Path

Client-side exploit delivery methods like malicious documents or browser-based attacks are among the most common ways adversaries gain initial access. But without visibility into these entry points, many attack paths go undetected. This demo shows how Falcon Exposure Management identifies and maps attack paths that begin with client-side exploitation. By combining exploit visibility with real network context and asset criticality, security teams can uncover hidden lateral movement risks and take action fast.