Discover attack surface management insights from our expert team

Explore the latest security trends, news, customer stories, and more.

Zerologon vulnerability

Zerologon Vulnerability: What is it and what you need to...

Learn about Zerologon - a critical vulnerability that affects Windows servers and can allow an attacker to bypass authentication and then gain administrator-level privileges in...

Penetration Testing
Why is Penetration Testing Important for SaaS Companies?

Why is Penetration Testing Important for SaaS Companies?

Penetration Testing
What You Must Know About the Dunkin Donuts Data Breach

Everything You Must Know About the Dunkin Donuts Data Breach

Cybersecurity Insights
Business Email Compromise: How to Protect Your Business

Business Email Compromise: How to Protect Your Business

Cybersecurity Insights
What is Continuous Security Monitoring and Why is it Important?

What is Continuous Security Monitoring and Why is it Important?

Attack Surface Management
How is Continuous Security Monitoring Used?

Continuous Security Monitoring: What it is and How it is...

Attack Surface Management
What are the Benefits of Continuous Security Monitoring?

What are the Benefits of Continuous Security Monitoring?

Attack Surface Management
Gain a Competitive Advantage with Cyber Security

Gain a Competitive Advantage with Cyber Security

proving you have the capacity and desire to prioritize data protection will help establish confidence with your customer-base to secure your organizations longevity and prosperity.

Cybersecurity Insights
Cyber Security Strategy

How to Create Your Best Cyber Security Strategy for 2023

Cybersecurity Insights
Asset discovery tools by Informer

Asset Discovery: Everything You Should Know | 2023 Guide

Attack Surface Management
Compliance: Why cyber security should be prioritized in the boardroom

Why cyber security should be prioritized in the boardroom

Cybersecurity Insights
5 Tips To Scale Your Cyber Security Program For Growth

5 Tips To Scale Your Cyber Security Program For Growth

Cybersecurity Insights
5 Expert Ways for Creating Secure Passwords

5 Expert Ways To Create Secure Passwords

Cybersecurity Insights
BBC Radio 1 logo

We Gave Security Advice To BBC Radio 1 Listeners

Company
NEW: Remote internal penetration testing from Informer

Remote Internal Penetration Testing: How It Works

Covid-19 has affected us all with significant new challenges each day. One of which is the ability to perform onsite penetration tests.

Penetration Testing
Happy fisherman | Informer. Vulnerability scanner

Are Phishing Assessments Worth The Money?

Cybersecurity Insights
Stressed out from making a mistake

7 Common Cybersecurity Mistakes And How To Avoid Them

Cybersecurity Insights
Collaboration For Effective Penetration Testing

The Most Effective Ways to Collaborate for a Pen Test

Penetration Testing