General

C-Level and Managers

Adopting a Cyber Threat Exposure Management Approach in 2023

Adopting a Cyber Threat Exposure Management Approach in 2023

Cyber Threat Exposure Management (CTEM) offers an advanced security risk management approach that emphasizes attack surface visibility. This comprehensive guide will walk you through how to adopt a CTEM mindset using ResilientX Cyber Exposure

The MOVEit breach impact and fallout: How can you respond? (CVE-2023-34362)

The recent MOVEit breach could go down as one of the most impactful exploitations of a zero-day vulnerability ever discovered. The effects continue to ripple around the world, with new victims coming forward almost

Adopting a Cyber Threat Exposure Management Approach in 2023

Adopting a Cyber Threat Exposure Management Approach

Cyber Threat Exposure Management (CTEM) offers an advanced security risk management approach that emphasizes attack surface visibility. This comprehensive guide will walk you through how to adopt a CTEM mindset using ResilientX Cyber Exposure

ResilientX Security - Owasp top 10

OWASP Top 10 API Security Risks – 2023

The Open Web Application Security Project (OWASP) has been at the forefront of promoting security best practices and providing valuable resources for developers, designers, architects, managers, and organizations. The OWASP API Security Top 10

ResilientX Blog - The first phase of risk assessment - Asset inventory

The First Phase Of Risk Assessment – Asset Inventory

In information technology, an asset inventory is a comprehensive list of all hardware and software assets within an organization. The inventory may include the name of the asset, the type of asset, the make and model