The seven most common web application attack vectors
Application Security
Modern web applications are complex, it is often made up of many layers where potential flaws could appear making it...
artificial-intelligence
What are AI and machine learning adding to threat...
Research & Threat Intel
As with any apparently game-changing technology, the benefits and drawbacks of artificial intelligence (AI) should be qualified by an accurate...
What are security misconfigurations?
Vulnerability Management
Misconfigurations are often seen as an easy target, as it can be easy to detect on misconfigured web servers, cloud...
press-release
Spring 2020 Release: Outpost24 announces agent-based scanning to enhance...
Press Release
Agent-based scanning helps organizations automate remote vulnerability assessment and enhance long term workforce security London, UK – June 1, 2020...
vulnerability prioritization
Why Threat Intelligence is Central to Effective Vulnerability Prioritization
Research & Threat Intel
Vulnerability management is a persistent feature of good cybersecurity practice; a routine hygiene to help proactively reduce organizational risk. But...