Discover attack surface management insights from our expert team

Explore the latest security trends, news, customer stories, and more.

Premera Blue Cross Breach: The Second-Largest HIPAA Settlement on Record

Premera Blue Cross Breach: The Second-Largest HIPAA Settlement on Record

Washingtons health insurer, Premera Blue Cross, has been charged with the second-largest HIPAA settlement ever. A prolonged cyberattack ensued the breach of up to 11...

Cybersecurity Insights
A Guide to Phishing: How To Spot A Suspicious Email And Protect

A Guide to Phishing: How To Spot A Suspicious Email...

Cybersecurity Insights
Zerologon vulnerability

Zerologon Vulnerability: What is it and what you need to...

Penetration Testing
Why is Penetration Testing Important for SaaS Companies?

Why is Penetration Testing Important for SaaS Companies?

Penetration Testing
What You Must Know About the Dunkin Donuts Data Breach

Everything You Must Know About the Dunkin Donuts Data Breach

Cybersecurity Insights
Business Email Compromise: How to Protect Your Business

Business Email Compromise: How to Protect Your Business

Cybersecurity Insights
What is Continuous Security Monitoring and Why is it Important?

What is Continuous Security Monitoring and Why is it Important?

Attack Surface Management
How is Continuous Security Monitoring Used?

Continuous Security Monitoring: What it is and How it is...

Continuous security monitoring (or CSM) refers to the uninterrupted mapping, analyzing, and management of an organization’s digital ecosystem – revealing their security posture and maintaining...

Attack Surface Management
What are the Benefits of Continuous Security Monitoring?

What are the Benefits of Continuous Security Monitoring?

Attack Surface Management
Gain a Competitive Advantage with Cyber Security

Gain a Competitive Advantage with Cyber Security

Cybersecurity Insights
Cyber Security Strategy

How to Create Your Best Cyber Security Strategy for 2024

Cybersecurity Insights
Asset discovery tools by Informer

Asset Discovery: Everything You Should Know | 2024 Guide

Attack Surface Management
Compliance: Why cyber security should be prioritized in the boardroom

Why cyber security should be prioritized in the boardroom

Cybersecurity Insights
5 Tips To Scale Your Cyber Security Program For Growth

5 Tips To Scale Your Cyber Security Program For Growth

Cybersecurity Insights
5 Expert Ways for Creating Secure Passwords

5 Expert Ways To Create Secure Passwords

To protect your data, strong passwords are essential. A weak password is one is an open door to cyber criminals...

Cybersecurity Insights
BBC Radio 1 logo

We Gave Security Advice To BBC Radio 1 Listeners

Company
NEW: Remote internal penetration testing from Informer

Remote Internal Penetration Testing: How It Works

Penetration Testing
Happy fisherman | Informer. Vulnerability scanner

Are Phishing Assessments Worth The Money?

Cybersecurity Insights