Must reads

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example
World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity

Security Solutions | 4 mins

World Aviation Festival 2024: Seven crucial factors in aviation cybersecurity
Everything CISOs need to know about NIS2

Security Solutions | 5 mins

Everything CISOs need to know about NIS2
Eden discusses DevSecOps and Lean

Security Solutions | 4 mins

DevSecOps and Adaptive Project Framework (APF): A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Aviation sector cybersecurity: A primer for sector CISOs

Security Solutions | 5 mins

Aviation sector cybersecurity: A primer for sector CISOs
Why automated penetration testing is essential for CTEM

Security Solutions | 5 mins

Why automated penetration testing is essential for CTEM
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management: The Difference Explained
DevSecOps and Extreme Programming: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Extreme Programming: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Understanding Attack Surface Management: What It Is and Why It Matters

Security Solutions | 5 mins

Understanding Attack Surface Management: What It Is and Why It Matters
DevSecOps and Lean: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Lean: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst

Security Solutions | 2 mins

Unleashing SanicDNS for Reconnaissance

Security Solutions | 4 mins

World First Reconnaissance Tool - AI Path Age Detection
The Economics Of Automated Penetration Testing

Security Solutions | 5 mins

The Economics Of Automated Penetration Testing
How real is automated penetration testing?

Security Solutions | 5 mins

How real is automated penetration testing?
DevSecOps and Kanban: A Security Perspective in Software Development

Security Solutions | 3 mins

DevSecOps and Kanban: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
DevSecOps and Scrum: A Security Perspective in Software Development

Security Solutions | 2 mins

DevSecOps and Scrum: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Prevent cloud misconfiguration to secure your organization

Security Solutions | 3 mins

Configuring the Cloud at Infosecurity Europe: Safeguarding Your Business
How To Incorporate Penetration Testing into your CTEM Program

Security Solutions | 6 mins

How To Incorporate Penetration Testing into your CTEM Program
Why EASM is essential to CTEM

Security Solutions | 4 mins

Why EASM is essential to CTEM
DevSecOps and Agile: A Security Perspective in Software Development

Security Solutions | 4 mins

DevSecOps and Agile: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Is Automated Penetration Testing the Future?

Security Solutions | 4 mins

Is Automated Penetration Testing the Future?

Security Solutions | 4 mins

The Top 5 CTEM Use Cases
Offensive cybersecurity: What is it and what tools do you need?

Security Solutions | 4 mins

Offensive cybersecurity: What is it and what tools do you need?
Is Penetration Testing Dated?

Security Solutions | 3 mins

Is Penetration Testing Dated?
Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest

Security Solutions | 5 mins

Bug-Proofing Your Rapid Development Cycle: The Power of the Automated PenTest
DevSecOps and Waterfall: A Security Perspective in Software Development

Security Solutions | 2 mins

DevSecOps and Waterfall: A Security Perspective in Software Development
Eden
Eden - Security Operations Analyst
Can penetration testing be automated?

Security Solutions | 4 mins

Automated security testing is on the rise
How NIS2 Will Impact Your Industry

Security Solutions | 3 mins

How NIS2 Will Impact Your Industry
Offensive AI Strengthens your Defenses

Security Solutions | 5 mins

Security is at the heart of digital transformation
The EU’s new NIS2 cybersecurity directive: Everything you need to know

Security Solutions | 5 mins

The EU’s new NIS2 cybersecurity directive: Everything you need to know
Recruiting to reduce risk: Addressing the cybersecurity skills gap

Security Solutions | 5 mins

Recruiting to reduce risk: Addressing the cybersecurity skills gap
Simplifying patching and security hardening

Security Solutions | 4 mins

Simplifying patching and security hardening
The GigaOm Radar Report for Attack Surface Management 2024 has been released, and Hadrian is the only vendor recognized as both a Leader and Outperformer

Security Solutions | 2 mins

GigaOm Radar: Hadrian is the only vendor recognized as both a Leader and Outperformer
The Development Methodologies: A Deeper Look

Security Solutions | 5 mins

The Development Methodologies: A Deeper Look
Eden
Eden - Security Operations Analyst
Five Ways to Make Your Security Team More Efficient

Security Solutions | 5 mins

Five Ways to Make Your Security Team More Efficient
Why DevSecOps is the best bet for secure development

Security Solutions | 5 mins

Why DevSecOps is the best bet for secure development
A DORA Compliance Checklist for Financial Resilience

Security Solutions | 2 mins

A DORA Compliance Checklist for Financial Resilience
How to pick an attack surface management solution?

Security Solutions | 4 mins

How to pick an attack surface management solution?
Does DevSecOps Make a Difference?

Security Solutions | 3 mins

Does DevSecOps Make a Difference?
Eden
Eden - Security Operations Analyst
Can penetration testing be automated?

Security Solutions | 3 mins

Can penetration testing be automated?
What is DevSecOps?

Security Solutions | 2 mins

What is DevSecOps?
Mobilize fast remediation with Secure Share

Security Solutions | 4 mins

Mobilize fast remediation with Secure Share
The importance of building a Software Bill of Materials (SBOM)

Security Solutions | 6 mins

The importance of building a Software Bill of Materials (SBOM)
How can the energy sector prepare for NIS2?

Security Solutions | 5 mins

How can the Energy Sector prepare for NIS2 Compliance?
Empowering EU Organizations: Navigating the Digital Security Landscape

Security Solutions | 2 mins

Empowering EU Organizations: Navigating the Digital Security Landscape
Why is the Digital Operational Resilience Act a game-changer?

Security Solutions | 1 mins

Why is the Digital Operational Resilience Act a game-changer?
Choosing the Right Pen Test Partner

Security Solutions | 4 mins

Choosing the Right Pen Test Partner
Top 10 Cyber Security Resources to Follow

Security Solutions | 4 mins

Top 10 Cybersecurity Resources to Follow
Managing your offensive security scope

Security Solutions | 4 mins

Managing your offensive security scope
Preparing for DORA: A Guide for Cybersecurity Experts

Security Solutions | 3 mins

Preparing for DORA: A Guide for Cybersecurity Experts
Revolutionizing offensive security with Generative AI

Security Solutions | 2 mins

Revolutionizing offensive security with Generative AI
What is automated penetration testing?

Security Solutions | 4 mins

What is automated penetration testing?
How to prepare for NIS2

Security Solutions | 6 mins

How to prepare for NIS2
Why CVSS 4.0 isn’t all you need

Security Solutions | 6 mins

Why CVSS 4.0 isn’t all you need
Software Bill Of Materials: Achieve Total Asset Visibility

Security Solutions | 3 mins

Software Bill Of Materials: Achieve Total Asset Visibility
Sasja Storms
Sasja Storms - Head of Customer Success
Offensive AI Strengthens your Defenses

Security Solutions | 3 mins

Offensive AI Strengthens your Defenses
Red team cybersecurity: Everything you need to know

Security Solutions | 4 mins

Red team cybersecurity: Everything you need to know
Attack Surface Management: Everything you need to know

Security Solutions | 6 mins

Attack Surface Management: Everything you need to know
Unlocking the Power of AI: Automation to Tackle Growing Threats

Security Solutions | 4 mins

Unlocking the Power of AI: Automation to Tackle Growing Threats
Adding context with Asset Tagging

Security Solutions | 3 mins

Adding context with Asset Tagging
Trends Shaping External Attack Surface Management (EASM) in 2023

Security Solutions | 3 mins

Trends Shaping External Attack Surface Management (EASM) in 2023
Mastering CISO Success with the Game-Changing Strategy of Continuous Threat Exposure Management

Security Solutions | 6 mins

Mastering CISO Success with the Game-Changing Strategy of Continuous Threat Exposure Management
Continuous Monitoring: The Only Way to Beat Hackers

Security Solutions | 4 mins

Continuous Monitoring: The Only Way to Beat Threat Actors
Rogier Fischer
Rogier Fischer - CEO
Integrating Threat Intelligence: Inside the minds of modern adversaries

Security Solutions | 5 mins

Integrating Threat Intelligence: Inside the minds of modern adversaries
Rogier Fischer
Rogier Fischer - CEO
Securing the retail sector’s attack surface

Security Solutions | 4 mins

Securing the retail sector’s attack surface
CTEM is driven by the constantly changing threat landscape

Security Solutions | 8 mins

From Vulnerability Management to Continuous Threat Exposure Management
Detecting exposed sensitive files

Security Solutions | 4 mins

Detecting exposed sensitive files
External Attack Surface Management vs Continuous Automated Red Teaming

Security Solutions | 4 mins

External Attack Surface Management vs Continuous Automated Red Teaming
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding directive, Binding Operational Directive 23-02

Security Solutions | 2 mins

Safeguarding Network Assets: CISA's Directive
Benefits of combining ASM with the power of Automated Security testing

Security Solutions | 5 mins

Securing the Digital Frontier: Synergizing EASM and Automated Security Testing
Rogier Fischer
Rogier Fischer - CEO
CART is a form of offensive security which simulates real-world attacks and assesses the security posture of an organization.

Security Solutions | 5 mins

What is Continuous Automated Red Teaming?
Automated Security Monitoring: Unveiling the Black Box

Security Solutions | 4 mins

Automated Security Monitoring: Unveiling the Black Box
Rogier Fischer
Rogier Fischer - CEO
Continuous Threat Exposure Management: The Hacker’s Perspective

Security Solutions | 7 mins

Continuous Threat Exposure Management: The Hacker’s Perspective
Rogier Fischer
Rogier Fischer - CEO
Hackers are using misconfigured firewalls

Security Solutions | 5 mins

Fortifying the frontline: How hackers exploit misconfigured firewalls
EASM can help track down vulnerabilities

Security Solutions | 5 mins

What is External Attack Surface Management (EASM)
Hadrian Hacker Melvin speaks about Asset Discovery

Security Solutions | 7 mins

Behind Enemy Lines: Hacker Insights on Asset Discovery
Melvin Lammerts
Melvin Lammerts - Hacking Manager at Hadrian
Predicting web pages’ age with AI: A new weapon in the fight against cyberattacks

Security Solutions | 4 mins

Predicting web pages’ age with AI: A new weapon in the fight against cyberattacks
Klaas
Klaas - AI Lead
To outsource or not to outsource: Automation is the key

Security Solutions | 4 mins

To outsource or not to outsource: Automation is the key
Bug Bounty and Attack Surface Management

Security Solutions | 3 mins

Bug bounty programs are great, but not enough – here’s why
Digitization and legacy systems in financial services: balancing the security risk

Security Solutions | 5 mins

Digitization and legacy systems in financial services: balancing the security risk
Leverage the hacker’s perspective in your security strategy

Security Solutions | 3 mins

Leverage the hacker’s perspective in your security strategy
The human attack surface – an underestimated cyber security threat

Security Solutions | 6 mins

The human attack surface – an underestimated cyber security threat
Online Assets to include in your Attack Surface Management Strategy

Security Solutions | 7 mins

Online Assets to include in your Attack Surface Management Strategy
Complexity v. Simplicity: Designing Attack Graphs for Usability

Security Solutions | 4 mins

Complexity v. Simplicity: Designing Attack Graphs for Usability
How the context of your code bases can affect the security of your applications

Security Solutions | 5 mins

How the context of your code bases can affect the security of your applications
The importance of contextualising assets in ASM

Security Solutions | 4 mins

Connecting the Dots
Defining the Assets in Your Attack Surface Management (ASM) Strategy

Security Solutions | 6 mins

Defining the Assets in Your Attack Surface Management (ASM) Strategy
Hadrian provides certainty in an economic down turn

Security Solutions | 5 mins

Hadrian provides certainty in an economic down turn
Event-driven testing balances continuity and intrusiveness

Security Solutions | 6 mins

Event-driven testing balances continuity and intrusiveness
Attack Surface Management vs Vulnerability Management

Security Solutions | 4 mins

Attack Surface Management vs Vulnerability Management
Impact of COVID-19 on cloud security

Security Solutions | 5 mins

Impact of COVID-19 on cloud security
How Hadrian mimics a hacker with AI

Security Solutions | 3 mins

Mimicking a hacker with event-based AI
Technology is changing and your security strategy needs to change with it

Security Solutions | 3 mins

Technology is changing and your security strategy needs to change with it
Rogier Fischer
Rogier Fischer - CEO