The Role of AI Vulnerabilities in Expanding Your Attack Surface
Guarding Against AI Vulnerabilities: How EASM Can Prevent Large-Scale Breaches
How the Critical React2Shell Vulnerability Puts Your Attack Surface at Risk and EASM’s Role in Mitigation
The Growing Threat of Credential Theft via npm Preinstall Attacks and How EASM Can Help
Boosting SIEM and SOAR Effectiveness with EASM
Living off the Land: How Attackers Hide in Plain Sight
The Small Changes That Lead to Big Breaches
Beyond the Obvious: Emerging OSINT Sources in 2025
The New Hacker Mindset
What “Attack Surface” Really Means in 2025
From Reconnaissance to Resilience
Why Security Debt Is the New Technical Debt
The UK Cyber Security and Resilience Bill: What You Need to Know
Why The Board Should Care About EASM
When OSINT Goes Wide: Why the Whole Team Matters
Do You Check for ShadowIT Risks?
What Star Wars can teach us about attack surfaces
Typo-squatting: more than typos
Why zero trust is the new normal
EASM won’t pass your PSN ITHC, but it will make life easier