Discover attack surface management insights from our expert team

Explore the latest security trends, news, customer stories, and more.

What is Penetration Testing?

What is Penetration Testing? A Step-by-Step Guide

Penetration Testing (or Pentesting) is a security practice widely used by organizations as part of their vulnerability management program. Pentesting provides assurance that an organization’s applications,...

Penetration Testing
Informer Platform Update

March 2022 Informer Platform Updates

Platform
What is Attack Surface Analysis?

How to Perform Attack Surface Analysis (ASA)

Attack Surface Management
Attack Surface Reduction

What is Attack Surface Reduction?

Attack Surface Management
A person walking through a dark tunnel

The 12 Most Common Attack Vectors You Need To Be...

Cybersecurity Insights
A smart thermostat on a wall

IoT Security – What it is and Why it’s Important

Cybersecurity Insights
Informer Platform Update

January 2022 Platform Updates – Here’s What’s New

Platform
Photograph of computer screen displaying code to optimize vulnerability management

Vulnerability Management: Best Way to Secure SaaS Companies

It’s no secret that with the evolving nature of software, SaaS organizations and small SaaS providers are seriously at risk of security breaches. They need...

Cybersecurity Insights
Informer External Attack Surface Management Platform

Attack Surface Management now with Integrated Penetration Testing

Platform
Penetration Testing: Everything You Need to Know

Penetration Testing: Everything You Need to Know

Penetration Testing
5 Ways CISOs Can Improve Their Cyber Resilience

5 Ways CISOs Can Improve Their Cyber Resilience

Cybersecurity Insights
7 Benefits of Automated External Asset Inventory Management

7 Benefits of Automated External Asset Inventory Management

Attack Surface Management
How Financial Services Benefit from Attack Surface Management

How Financial Services Benefit from Attack Surface Management

Attack Surface Management
How to Map Your Attack Surface With Continuous Security Monitoring

Unlocking Comprehensive Attack Surface Mapping Through Continuous Security Monitoring

Attack Surface Management
5 Tips to Achieving Better Cyber Security for Charities

5 Tips to Achieving Better Cyber Security for Charities

More than a quarter of charities were affected by cyber breaches or attacks in 2020. Find out how to prevent falling victim and fortify your...

Cybersecurity Insights
Penetration Testing Vs Vulnerability Scanning

Penetration Testing Vs Vulnerability Scanning

Penetration Testing
How To Avoid Ransomware In Financial Services

How To Avoid Ransomware In Financial Services

Cybersecurity Insights
Why Financial Services need Penetration Testing

Why Financial Services Need Penetration Testing In 2024

Penetration Testing