Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IONIX

Cyberpion is Now IONIX: Redefining Attack Surface Management with the Widest Coverage and Sharpest Focus

I’m thrilled to unveil our new identity: Cyberpion is now IONIX, a name that represents our radically different approach to protecting the modern attack surface and its digital supply chain. With IONIX, you’ll discover your organization’s real attack surface, including its sprawling network of asset dependencies – while separating the signal from the noise so your security team gains laser focus on your exploitable risks.

Security Control Types for Attack Surface Reduction

Cybersecurity is an ever-present concern for businesses, particularly as the modern attack surface continuously expands and changes due to the shift to remote work in response to the COVID-19 pandemic, cloud adoption, and the growth of shadow IT, among other factors. Implementing the appropriate security control types for attack surface reduction is crucial for bolstering your company’s cybersecurity posture in the modern threat landscape.

External Attack Surface Management Market Size: An Overview

Attack surface management (ASM) is becoming increasingly important for businesses today. The attack surface is expanding and becoming more complex than ever before, driven by numerous factors, including the COVID-19 pandemic and resulting shift to remote work, widespread cloud adoption and the resulting growth of shadow IT, increased use of managed services (SaaS), and third-party vendor services.

Surfing the ASM Wave - Thoughts from Cyberpion's Newly Appointed CEO, Marc Gaffan

I’m thrilled to be partnering with Nethanel Gelernter and taking on the CEO role at Cyberpion. Several months ago, Liran Grinberg introduced me to Cyberpion to explore the possibility of joining the Board and helping the leadership team take the company to its next level of growth.

Attack Surface Management vs. Vulnerability Management: What's the Difference?

Attack surface management (ASM) and vulnerability management (VM) are often confused, but they’re not the same. The primary difference between the two is scope: Attack surface management and external attack surface management (EASM) assume that a company has many unknown assets and therefore begin with discovery. Vulnerability management, on the other hand, operates on the list of known assets.