Discover attack surface management insights from our expert team

Explore the latest security trends, news, customer stories, and more.

5 Stages of Attack Surface Management

What Are The 5 Stages of Attack Surface Management?

Developments in cloud computing and IoT benefitted organizations in many ways over the last decade through digital transformation strategies. The modern organization’s IT infrastructure is...

Attack Surface Management
Informer Platform Update

March 2022 Second Informer Platform Update

Platform
5 Stages of Penetration Testing

What Are The 5 Stages of Penetration Testing?

Penetration Testing
What is Penetration Testing?

What is Penetration Testing?

Penetration Testing
Informer Platform Update

March 2022 Informer Platform Updates

Platform
What is Attack Surface Analysis?

How to Perform Attack Surface Analysis (ASA)

Attack Surface Management
Attack Surface Reduction

What is Attack Surface Reduction?

Attack Surface Management
A person walking through a dark tunnel

The 12 Most Common Attack Vectors You Need To Be...

An attack vector is a path or means by which a cyber criminal can gain unauthorized access to a network or system. Understanding common attack...

Cybersecurity Insights
A smart thermostat on a wall

IoT Security – What it is and Why it’s Important

Cybersecurity Insights
Informer Platform Update

January 2022 Platform Updates – Here’s What’s New

Platform
Photograph of computer screen displaying code to optimize vulnerability management

Vulnerability Management: Best Way to Secure SaaS Companies

Cybersecurity Insights
Informer External Attack Surface Management Platform

Attack Surface Management now with Integrated Penetration Testing

Platform
Penetration Testing: Everything You Need to Know

Penetration Testing: Everything You Need to Know

Penetration Testing
5 Ways CISOs Can Improve Their Cyber Resilience

5 Ways CISOs Can Improve Their Cyber Resilience

Cybersecurity Insights
7 Benefits of Automated External Asset Inventory Management

7 Benefits of Automated External Asset Inventory Management

We outline some of the core benefits of saying goodbye to laborious manual inventory management and harnessing automated security scanning.

Attack Surface Management
How Financial Services Benefit from Attack Surface Management

How Financial Services Benefit from Attack Surface Management

Attack Surface Management
How to Map Your Attack Surface With Continuous Security Monitoring

How to Map Your Attack Surface

Attack Surface Management
5 Tips to Achieving Better Cyber Security for Charities

5 Tips to Achieving Better Cyber Security for Charities

Cybersecurity Insights