Discover attack surface management insights from our expert team

Explore the latest security trends, news, customer stories, and more.

Informer External Attack Surface Management Platform Update

January 2022 Platform Updates – Here’s What’s New

Welcome to our first External Attack Surface Management & Penetration Testing platform update of 2022! We’ve been busy reviewing feedback from our customers and developing...

Platform
Photograph of computer screen displaying code to optimize vulnerability management

How SaaS Organizations Can Optimize Vulnerability Management

Cybersecurity Insights
Informer External Attack Surface Management Platform

Attack Surface Management now with Integrated Penetration Testing

Platform

Penetration Testing: Everything You Need to Know

Penetration Testing

5 Ways CISOs Can Improve Their Cyber Resilience

Cybersecurity Insights

7 Benefits of Automated External Asset Inventory Management

Attack Surface Management

Why Financial Services Need Attack Surface Management

Attack Surface Management

5 Tips to Achieving Better Cyber Security for Charities

More than a quarter of charities were affected by cyber breaches or attacks in 2020. Find out how to prevent falling victim and fortify your...

Cybersecurity Insights

How to Map Your Attack Surface With Continuous Security Monitoring

Attack Surface Management

Penetration Testing Vs Vulnerability Scanning

Penetration Testing
London bus outside the Bank of England

How To Avoid Ransomware In Financial Services

Cybersecurity Insights
Stock market prices in newspaper

Why Financial Services Need Penetration Testing In 2020

Penetration Testing

Dependency Confusion – A New Attack Technique

Penetration Testing
Laptops taking part in a penetration test | Informer.

What’s The Difference Between A Penetration Test And Bug Bounty?

Penetration Testing

Using Machine Learning to Identify Phishing Links

In previous posts, we have looked at how to identify potential phishing attempts which may contain malicious URLs that can harvest your credentials.  Recent attacks...

Cybersecurity Insights
Ethernet cables plugged into server

How Machine Learning Is Used In Cyber Attacks

Cybersecurity Insights
Enigma encryption machine

How Machine Learning Is Used In Cyber Security

Cybersecurity Insights

7 Ways Small Businesses Can Prevent A Cyber Attack

Cybersecurity Insights