-
TechTarget: Security hygiene and posture management: A work in progress
Read MoreSecurity hygiene and posture management may be the bedrock of cybersecurity, but new research shows it is still decentralized and complex in most organizations.
-
Cybersecurity is: Competition – Here’s the Playbook – Part 3
Read BlogTo successfully resolve any conflict, or win a competition, there are three things you must do: You have to successfully plan, bring capabilities to bear, and keep score. Let’s explore this in more detail with a generic sports metaphor.
-
Cybersecurity Is: Expensive … And It’s Your Fault – Part 2
Read Blog“Cybersecurity is expensive and it’s your fault” seeped into my conscious while I was sleeping, and I awoke a little rattled.”
-
Defense Surface Management is the Missing Link to your CTEM Program
In 2015, officials from the DoD and NSA asked one simple question that served as the catalyst for Threat-Informed Defense (TID) and Continuous Threat Exposure Management (CTEM): “Are we managing...Read Blog -
Campaign Readiness Guide for Advisory: People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
Recently, the U.S. and International Agencies release a Joint Cybersecurity Advisory (JCA) (People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection | CISA) regarding VOLT...Read More -
Cybersecurity Is: Failing… How do we start to Win? – Part 1
Read BlogCybersecurity is failing but this shouldn’t be news to you.
-
Foundations for Continuous Threat Exposure Management: Implementing a Threat-Informed Defense Strategy
Automation and threat prioritization are necessary to properly assess, configure, optimize and align current security tools to defend against advanced threats in a timely manner. Despite the growing investment in...Read Paper -
BrightTalk @ RSA Conference 2023
Read MoreHear from industry leaders, Nick Lantuh, CEO & Co-Founder of Interpres Security, and Mark Bowker, Senior Analyst at Enterprise Strategy Group, as they discuss the current state of the cybersecurity…
-
Interpres Security Operationalizes Threat Exposure Management Programs by Continuously Improving Defensive Posture & Managing Risk
WASHINGTON, D.C. - April 24, 2023 - Interpres Security, a company dedicated to right-sizing and optimizing defenses to reduce threat exposure, today announced new enhancements to its patented, multi-tenant SaaS...Read News
Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure. The Interpres Threat Exposure Management Platform analyzes the dynamic relationship between defensive and adversarial capabilities, assets, and their exploitable vulnerabilities; prioritizes the required defensive actions; and optimizes the security environment, to provide continuous threat exposure management.