By Erica Azad Oct 26, 2020What Attack Surface Skeletons are Hidden in your Closet? Let me tell you a little spooky tale that you may find eerily familiar. A marketing team builds a site for an event, but “forgets” to loop-in the IT team.. After the event, the site is forgotten-- for all but… Read More
By Erica Azad Oct 21, 20204 Attack Surface Management Mistakes to Avoid How can you secure what you don't know you have? When it comes to security, visibility is key. In fact, Gartner predicted that around 30% of successful attacks this year would be against shadow IT. It seems like there is a… Read More
By Lauren Craigie Aug 20, 20204 Things To Consider Before Your Next M&A The due diligence portion of an M&A is lengthy and complex, yet security teams are often given just a few weeks to perform a full risk analysis before final terms are agreed. That’s very little time to source, activate, and… Read More
By Lauren Craigie Aug 19, 2020Introducing Bugcrowd M&A Assessment The final mile for many Merger and Acquisition events is the security assessment. Once the acquiring party believes the business case is sound, the security team swings in for a final nod of approval. With little time to spare, security… Read More
By Lauren Craigie May 27, 20202020 Remote Work Survey: How Security Leaders Are Responding to More Threats, With Less Budget Shelter-in-Place orders launched many organizations into fully-remote operating models, without precedence or a playbook for doing so both quickly and securely. In fact, according to a recent Bugcrowd survey, 74% of security leaders at organizations that weren’t already remote-first reported… Read More
By Lauren Craigie May 13, 2020Building the Business Case for Attack Surface Management Note: This is part 5 of a 5-part series in which we examine a smarter approach to attack surface management. Catch up on last week’s post first. I love the term “attack surface management.” So much so that that’s what we… Read More
By Michael Skelton Apr 29, 2020A Recon Hacker’s Opinion: How Human Ingenuity Uncovers More Attack Surface Note:This is part 4 of a 5-part series in which we examine a smarter approach to attack surface management. Catch up on last week’s post first. Attack surface is evolving faster than ever. If you think of a business like a… Read More
By Lauren Craigie Apr 7, 20205 Reasons Why Attack Surface Scanners Aren’t Enough Inside-out: How organizations typically defend their digital ecosystem. Outside-in: How attackers actually operate. In other words, while organizations work to secure priority assets, attackers are more focused on whatever fell off the radar. Unknown or un-prioritized assets become ticking time-bombs… Read More
By Bugcrowd Product Marketing Apr 2, 20203 Tips To Keep Company Data Secure When Employees Work Remotely The coronavirus pandemic is entering its second quarter, and millions of people are now working from home using corporate devices with access to sensitive company data. Naturally, hackers remain hot on their heels and seek to infiltrate corporate systems by… Read More
By Lauren Craigie Mar 30, 20205 Things We Learned from the 5 Mins to 50% More Attack Surface Webinar Note: This blog is a recap of our latest webinar, “5 Minutes to 50% More Attack Surface” You can access the full recording here. It’s 11pm. Do you know where your assets are? Do your attackers? In our latest webinar,… Read More