Detectify platform enhancements address growing attack surface complexity

Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies.
These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy breaches based on their unique definition of risk, a feature unmatched by any other player in the EASM space.
Attack surfaces keep growing and becoming more diverse, making it increasingly challenging for organizations to obtain and make sense of the most relevant insights from their attack surface data.
Security teams highlight the need to identify and reduce risks unique to their business context.
Detectify users see an average of 300 breaches per set policy.
Over 70% of active policies today focus on spotting risky open ports, with 60% specifically alerting on any detected ports other than 80 or 443.
This emphasizes that identifying areas of the attack surface that could be improved, such as open ports, is key for security teams.
Their complete attack surface, at a glance: Security teams need a complete grasp of their attack surface evolution to support incident investigations or find out how their domains are exposed.
The new Domains page provides a complete view of all monitored domains within the attack surface with continuously attributed data to each domain, consisting of IPs, cloud providers, and even fingerprinted technologies over a period of time.
Customizable attack surface data based on their workflows: Security teams require continuous monitoring of exposures to take action on those issues in future occurrences.
Customers can now directly create customized policies for their attack surface data through the new Domains page when spotting anomalies.
This innovative workflow allows them to set up alerts for breaches aligned with their specific risk definitions, a capability not offered by any other EASM product.
Risk management that reflects their business context: Among security teams' jobs is the need to remain informed about the evolution of their attack surface, identify exposed elements, and pinpoint specific assets affected by exposure according to their unique risk definition.
The new Domains page enables users to assess potential exposure risks and set security policies based on completely new characteristics.
Detectify's new Domains page and enhanced Attack Surface Policies are now available to all Surface Monitoring customers.
New data points will continue to be released to the Domains page, which will further expand the specificity of security policies that users can create and receive alerts for.
Teams will soon be able to integrate alerts into their existing workflows through the Detectify API and Integrations platform.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Mon, 27 May 2024 13:43:04 +0000


Cyber News related to Detectify platform enhancements address growing attack surface complexity

Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
1 month ago Helpnetsecurity.com
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
6 months ago Esecurityplanet.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
1 year ago Trendmicro.com
Attack Surface Management: What is it? Why do you need it? - Traditional asset inventory and vulnerability management software can't keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates from a ...
6 months ago Securityboulevard.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
Limiting Remote Access Exposure in Hybrid Work Environments - Organizations have shifted to remote desktop work environments at an increasing speed since then - simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. The remote work revolution has pushed companies ...
7 months ago Securityboulevard.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)- IONIX, a leader in Attack Surface Management, today announced it has completed its $42 million A Round financing by securing $15 million in additional funding from new investors Maor Investments along ...
5 months ago Darkreading.com
CVE-2023-52648 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
A Symphony of Network Success: Simplify, Secure, and Scale with Cisco SD-WAN Enhancements - Your network is like an orchestra, where each element assumes the role of a unique instrument-computers, devices, applications, security measures, remote connections. Cisco SD-WAN empowers both enterprise IT teams and managed service providers to ...
5 months ago Feedpress.me
CVE-2022-36407 - Insertion of Sensitive Information into Log File vulnerability in Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500, Hitachi Virtual Storage Platform G1000, G1500, Hitachi Virtual Storage Platform F1500, Hitachi Virtual ...
3 months ago
Security Boulevard - Veriti proactively monitors and safely remediates risk across the security infrastructure to elevate CNAPP by remediating compensating controls, without disrupting the business. EXECUTIVE SUMMARY. The Veriti and Prisma Cloud integration transforms ...
1 month ago Securityboulevard.com
Action1 platform update improves patching workflows - Action1 announced its latest release and the introduction of a new guiding concept for its business. The latest feature update contains multiple enhancements to the Action1 platform, empowering customers to bring their patching efforts 'down to ...
4 months ago Helpnetsecurity.com
Firms fear software stack breach as attack surface widens - Organizations feel they are vulnerable to multi-tiered cyber attacks that can impact the entire software stack, as they face more challenges with a widening attack surface. As it is, 92% acknowledge making compromises in application security due to ...
1 year ago Zdnet.com
Omdia: Standalone Security Products Outsell Cybersecurity Platforms - In its many briefings with cybersecurity vendors, one of the most consistent themes Omdia hears is why enterprises need cybersecurity platforms. Instead, vendors claim, enterprises could get better outcomes if they give up their multitude of ...
6 months ago Darkreading.com
Vectra AI Launches Global, 24x7 Open MXDR Service Built to Defend Against Hybrid Attacks - PRESS RELEASE. San Jose, Calif. - February 15, 2024 - Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, today announced the launch of Vectra MXDR services, the industry's first global, 24x7 open MXDR service built to ...
4 months ago Darkreading.com
MixMode platform enhancements boost threat detection and response - This release gives customers greater visibility into their digital attack surface, improved investigation capabilities, and increased customization options. Alert enrichment enhancements: MixMode's alert enrichments have been significantly enhanced ...
7 months ago Helpnetsecurity.com
Trulioo Launches Global Identity Platform for Person and Business Verification - Identity verification firm Trulioo on Tuesday launched a new global identity platform for Person and Business verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from ...
1 year ago Csoonline.com
Simplify budgets and purchasing with Cisco Security Suites - In the pursuit of better security outcomes, organizations have relied on an ever-increasing number of products and services. On average, enterprise customers use as many as 76 unique security solutions. This complexity makes it very difficult for ...
6 months ago Feedpress.me
What Is Dynamic Host Configuration Protocol (DHCP)? - DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of ...
1 year ago Heimdalsecurity.com
Strengthen, Unify and Simplify Cybersecurity Tools - Increasingly, security conscious enterprises are turning to platformization to drive better security outcomes and simplify operations. Smartphones, cloud, remote work, and now AI, all bring complexity to information security, yet they must be enabled ...
1 week ago Paloaltonetworks.com
SUSE announces new enhancements to help users manage business-critical workloads - SUSE announced enhancements across its cloud native and Edge portfolio to enable customers to securely deploy and manage business-critical workloads anywhere. New capabilities in Rancher Prime 3.0, SUSE's commercial offering of Rancher and SUSE Edge ...
3 months ago Helpnetsecurity.com
Reco Employs Graph and AI Technologies to Secure SaaS Apps - Reco today launched a platform that makes use of machine learning algorithms and graph technology to secure software-as-a-service applications. The Reco Identities Interaction graph technology connects to SaaS applications via its application ...
6 months ago Securityboulevard.com
CVE-2012-3369 - The CallerIdentityLoginModule in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 allows remote attackers to gain privileges of the previous user via ...
6 years ago
CVE-2012-5478 - The AuthorizationInterceptor in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 does not properly restrict access, which allows remote authenticated ...
6 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)