Outpost 24

Karlskrona, Sweden
2001
Oct 23, 2020   |  By Simon Roe
In our previous blog we covered the first 10 of the NSA vulnerabilities currently targeted by Chinese hackers, here the remaining ones, again demonstrating the predictive power of our risk based vulnerability management tool Farsight
Oct 22, 2020   |  By Simon Roe
This week NSA published a list of the top 25 vulnerabilities that Chinese hackers are actively exploiting, and unsurprisingly the list included some of the most prominent CVEs that we’ve covered in our previous risk based vulnerability management blogs.
Oct 15, 2020   |  By Simon Roe
This time around, the MySQL vulnerabilities caught our attention because of their low CVSS scores compared to their high likelihood risk rating. This is something we see often when working with our customers, and demonstrates how a risk based approach to vulnerability management changes as organizations focus on where there is a real risk of compromise.
Oct 9, 2020   |  By Sergio Loureiro
Containers are at the forefront of software development creating a revolution in cloud computing. Developers are opting for containerization at an impressive rate due to its efficiency, flexibility and portability. However, as the usage of containers increases, so should the security surrounding it. With containers comprising of many valuable components it is of the utmost importance that there are no vulnerabilities exposed when developing applications, and risks are mitigated before containers, and their contents, reach the end-user.
Sep 30, 2020   |  By Simon Roe
Since the global pandemic we’ve been writing about the latest CVEs to look out for in our risk based vulnerability management blog. As we head into the Autumn and the nights begin to draw in, threat actors continue to exploit vulnerabilities and cause disruption. Let’s take a look at some that have raised their profile in the last couple of weeks
Sep 23, 2020   |  By Sergio Loureiro
Containers have become very popular with DevOps as a way to increase speed and agility. However, with recent reports of hackers utilizing vulnerabilities in Docker container images to compromise hosts and launch malicious containers – how can we identify this at the time of development to prevent security costing us later?
Sep 16, 2020   |  By Simon Roe
We are adding CREST to our growing list of industry certifications, which includes PCI ASV and ISO 27001 ensuring our customers know they’re in good hands and the services they receive meet industry best practice and vital data sovereignty standards.
Sep 4, 2020   |  By Simon Roe
Since the start of the pandemic we’ve been writing about the latest CVEs to look out for in our risk based vulnerability management blog. As we head into the Autumn and the nights begin to draw in, threat actors continue to exploit vulnerabilities the world over. Let’s take a look at some that have raised their profile in the last couple of weeks.
Sep 1, 2020   |  By Outpost 24
Learn about the new product features or watch the video highlight of our Summer release to help you manage vulnerabilities more effectively and automate security hygiene across the full technology stack with less effort.
Aug 12, 2020   |  By Simon Roe
Since April 2020 we’ve been writing about the latest CVEs to look out for in our risk based vulnerability management blog. Going into August we are highlighting a CVE affecting a popular password vault – KeePass, along with a few interesting ones. Read on for more information on how to prioritize these vulnerabilities for patching to mitigate risk.
Sep 10, 2020   |  By Outpost 24
It’s challenging times and at Outpost24 we’re working hard to make our platform better and easier to use so we can support the work you do every day.
Jun 12, 2020   |  By Outpost 24
Security assessments can be performed in many ways, depending on your organization’s maturity level and goals. Whilst vulnerability scanning can help to identify security flaws on a broader scope and penetration testing can conclude the risk level of vulnerabilities discovered, if you need to understand the full picture of your organization’s security awareness and readiness, a scenario-based Red Teaming Assessment (RTA) is the best way to assess the effectiveness of your defence mechanism from a hacker’s view.
Jun 12, 2020   |  By Outpost 24
triving for total security is like searching for the holy grail: the chase is real, but mostly in vain. By spending too much time discovering vulnerabilities and fixing issues, it often leads to the dire consequences of missing delivery deadlines, crippling the development team’s ability to move forward and capture market opportunity.
Jun 3, 2020   |  By Outpost 24
Webinar: Staying alert in the new normal, how Outpost24 Farsight focuses on the vulnerabilities that are most likely to be exploited in the wild with predictive risk based vulnerability management
May 18, 2020   |  By Outpost 24
Showing you how much easier it is to understand manually written instructions to help you recreate and understand your vulnerabilities.
May 18, 2020   |  By Outpost 24
Customize the tool and the reports to suit you and your organization.
May 18, 2020   |  By Outpost 24
Initial setup that allows you to get notifications when new vulnerabilities are being reported for your application. This functionality also have integration capabilities that can help your organizations IT-security process.
May 18, 2020   |  By Outpost 24
Once you have resolved your vulnerabilities or have questions about them, this is how you contact the Outpost24 SWAT Team.
May 18, 2020   |  By Outpost 24
See what applications you have in your swat license and how they fair against OWASP top ten and other web application security standards.
May 15, 2020   |  By Outpost 24
A quick intro to Outpost24's service desk with our security Managed Services
Oct 9, 2020   |  By Outpost 24
Web app attacks remain the #1 vector exploited in successful breaches. With agile development, apps run the risk of creating new vulnerabilities or perpetuating old ones on a weekly, daily, even hourly basis, security and risk managers need to step up a programmatic response. Fortunately there's a new, collaborative model for Appsec that organizations can operate in a mostly automated manner. Download our useful DevOps guide and learn how best to operationalize security testing in an agile process.
Oct 9, 2020   |  By Outpost 24
More and more companies choose to migrate to a Cloud infrastructure to take advantage of new resources, an elastic storage power and agile deployment, nevertheless IT professionals are not always trained to secure these new technologies. Like traditional infrastructures, a public Cloud infrastructure services requires the implementation of security measures and controls by their users. Enterprises must adapt their security policy to these new technologies to reap the Cloud benefits without increasing their cyberattacks exposure area.
Oct 1, 2020   |  By Outpost 24
We surveyed over 200 security professionals at the 2020 RSA conference to delve deeper into the dangers of rogue access points and understand how security professionals are tackling wireless security. Our data highlights their main concerns and the key trends from IT and network security professionals on the wireless security frontline. Key findings in the 2020 Internet of Evil Things report: Download the 2020 IoET Report to uncover valuable wireless security insights to help protect your organization's network airspace in the future.
Oct 1, 2020   |  By Outpost 24
Cloud is the new fact of life for providing enterprise IT services. However, security professionals are left feeling unclear about the complexities surrounding cloud, shared responsibility and understanding where the cloud provider security tools from AWS, Azure and Google Cloud Platform are falling short.
Sep 1, 2020   |  By Outpost 24
Are you struggling to triage through tons of findings to identify the greatest threats and patch more effectively? You are not alone! With speed being the biggest challenge to effectively patch, this whitepaper looks at how existing prioritization works with CVSS scoring and how a risk based approach with machine learning can be applied to align corporate risk appetite and drive better decision making for optimal efficiency.

Effortlessly automate identification of web application, network infrastructure, wireless and cloud vulnerabilities with a risk based approach for fast remediation.

Over 2,000 customers worldwide trust Outpost24 to assess their devices, networks, applications, cloud and container environments and report compliance status. We serve leading organizations across a wide range of segments including financial services, government, healthcare, retail, telecommunications, technology, and manufacturing.

Full stack security scanning and penetration testing:

  • Single Platform, Total Coverage: Servers, endpoints, devices, switches, apps, clouds and containers. We got you covered in a single UI with risk based insights.
  • Developed by Ethical Hackers: It takes a hacker to stop a hacker. We built years of ethical hacking experience into our products and services for best vulnerabitity results.
  • Continuous Security Testing: Our tools work around the clock to automate scans and orchestrate security controls to protect you on a continual basis.

Complete vulnerability and security assessment.