Elastic Compute Cloud (or in short EC2) is an infrastructure-as-a-service offering and one of the widely adopted services in the AWS platform.
The Verizon’s 2020 Data Breach Investigations Report was recently published. This year’s report, all 119 pages of it, are full of interesting insights. Here are the report’s key findings and our take on them.
The Reposify team is pleased to announce the release of Reposify Optimizer - a game changing capability built into Reposify’s Attack Surface Management Platform.
Millions of sensitive assets are left exposed to the internet every day, leaving organizations attack surfaces vulnerable to various risks which could results in a breach.
Each week will be sharing fresh data, from Reposify's platform, on the most common exposures, CVEs as well as tips on how to avoid them.
Cyber security risk assessment is a fundamental building block in any cyber security program. It enables you to identify all the potential risks and security issues that your organization might face and ensure the right policies and tools are put in place to improve your overall security posture.
Remote access channels are one of the preferred attack vectors for criminals trying to obtain access to organizations’ internal networks. Recently, various vulnerabilities in enterprise VPNs were exploited in the wild during attack campaigns by malicious actors and nation-states.
In these days of uncertainty, while many, if not most of us are at home trying to balance working remotely and family life, DevOps, IT & security teams are doubling down on their efforts to provide the technical support needed to ensure business continuity. The task at hand presents a unique challenge which for many organizations is uncharted.