Blog
Blog
Threat Exposure Management: An Overview
In recent years, the threat landscape has rapidly evolved, resulting in a growing number of cyber security incidents. This has
Blog
Blog
Empowering CTEM Program with Contextualized Vulnerability Prioritization
Vulnerability Prioritization Technology (VPT) has been evolving over the years, adapting to the changing architectures and systems that drive the
Blog
Blog
Gartner: “Organizations Must Expand From Threat to Exposure Management in 2023”
Gartner Predicts notes are the summation of efforts from analysts’  market research, vendor briefings, investor and end-user inquiries to predict an event,
Blog
Blog
Hive Pro includes Breach & Attack Simulation as a feature in its Threat Exposure Management Platform
Although the Gartner Hype Cycle for Security Operations 2022 has positioned Breach and Attack Simulation (BAS) solutions at the peak
Blog
Blog
What is Continuous Threat Exposure Management (CTEM)?
Why don’t all of your tools in your SOC talk?  This isn’t a rhetorical question. We know that cybersecurity is
Blog
Blog
How Continuous Threat Exposure Management can Secure the Finance Sector
Organizations are becoming increasingly vulnerable to cyberattacks that risk the security and privacy of stakeholders and clients. The financial services
Blog
Blog
WHAT YOU SHOULD KNOW: Patch OpenSSL 3.x
On October 25th 2022 the OpenSSL project team announced OpenSSL v.3.0.7: a CRITICAL security-fix release. This is only the second time that the OpenSSL project
Blog
Blog
Threat exposure management: the answer to 21st century cyber-security challenges
The chief information security officer (CISO) role is one that came into being as a result of an increasing wave
Blog
Blog
How Continuous Threat Exposure Management (CTEM) can secure the Healthcare Sector
Organizations are becoming increasingly susceptible to cyberattacks threatening the safety and privacy of stakeholders and clients alike. This is even
Blog
Blog
How Continuous Threat Exposure Management helps the Telecom sector defend against cyber threats
The telecom industry connects the world. Its intricate infrastructure is built around vast amounts of data on the world’s population
1 2 3 4 5

What’s new on HivePro

Get through updates and upcoming events, and more directly un your inbox