security posture
Seeing the Unseen: How Generative AI Elevates Situational Awareness in Cybersecurity
Situational awareness in cybersecurity is hard! And poor situational awareness can be disastrous in cybersecurity. For a CISO, it could mean missing acting on a critical gap in the security program, leading ...
Patch Tuesday Update – August 2024
In this Patch Tuesday edition, Microsoft addressed 101 CVEs, 89 Microsoft CVEs and 12 non-Microsoft CVEs. Seven are Critical, and 77 are Important. Ten are zero-days, with six exploited in the wild ...
4th generation vulnerability prioritization: what is the buzz all about?
In the rapidly evolving world of cybersecurity, staying ahead of threats requires more than just reactive measures—it demands foresight and precision. Enter the 4th generation of vulnerability prioritization, a paradigm shift that’s ...
Meet BIX: Your New AI Ally in Cyber Risk and Exposure Management
What if I told you that managing cyber risk could be as easy as asking a colleague a question and getting a clear, actionable answer? Imagine having the ability to instruct your ...
Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative AI
Generative AI has great potential for scaling and automating security practices, but to be effective, organizations need to have a strong security foundation ...
Threat Hunting in Smart SOAR
In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...
Threat Hunting in Smart SOAR
In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...
Patch Tuesday Update – June 2024
In this Patch Tuesday edition, Microsoft addressed 49 CVEs across its entire portfolio of products. One was marked Critical and 48 Important. No zero-days and none of them exploited in the wild ...
What is CTEM? The Basics of Continuous Threat Exposure Management
This article discusses the basics of CTEM and its five phases. For a detailed guide, including a checklist, for organizations looking to migrate to CTEM, don’t miss our Comprehensive CTEM ebook. What ...
Cybersecurity Insights with Contrast CISO David Lindner | 6/07/24
Insight #1 In the digital age, data has become an incredibly valuable asset. Just as oil was a driving force in the industrial revolution, data is fueling the information age. This realization ...