News & Blog

Keep up to date about Glasstrail

New feature: Vendor domain scans

New feature: Vendor domain scans

Vendor risk assessments are practical, highly accessible vendor security reviews.

Andrew Taylor
How to use External Attack Surface Management tools for ISO 27001:2022 compliance

How to use External Attack Surface Management tools for ISO 27001:2022 compliance

Tips on using EASM tools as part of ISO 27001:2022 compliance.

Andrew Taylor
Using external attack surface management tools to validate that your security controls meet SOC 2 standards

Using external attack surface management tools to validate that your security controls meet SOC 2 standards

Tips to improve the effectiveness of your security controls for SOC2

Andrew Taylor
Email hardening: When to use SPF, DKIM, and DMARC to reduce security risks

Email hardening: When to use SPF, DKIM, and DMARC to reduce security risks

DKIM, DMARC, and SPF - what are they and when should they be used? And why it's best to use all three.

Andrew Taylor
Open Source Intelligence Technology (OSINT): When is the right time to start using OSINT data in cyber security efforts?

Open Source Intelligence Technology (OSINT): When is the right time to start using OSINT data in cyber security efforts?

See how cyber professionals use OSINT data to protect their data and networks.

Liz Knight
Why your cyber security posture matters when selling your business

Why your cyber security posture matters when selling your business

Cyber security considerations when preparing your business for sale.

Andrew Taylor
What are the cyber security considerations for mergers and acquisitions?

What are the cyber security considerations for mergers and acquisitions?

Why external attack surface scanning is a must have when you're undertaking a M&A.

Andrew Taylor
New feature: Integrating Glasstrail into your monitoring tools

New feature: Integrating Glasstrail into your monitoring tools

Integrating with webhooks and cURL, Glasstrail lets you subscribe to the findings of interest to you.

Andrew Taylor
Deepening attack surface scans with OWASP Top 10

Deepening attack surface scans with OWASP Top 10

Glasstrail now includes several key OWASP Top 10 findings.

Liz Knight
GPT - Hacks made easy

GPT - Hacks made easy

What does it mean when hackers have GPT technology at their disposal? We can expect better, more automated attacks and a lower barrier to entry. The implication for organisations is that there is never a better time to step up your defences than now.

Andrew Taylor
MSPs and external attack surface monitoring: Tools to maximize safety and margins

MSPs and external attack surface monitoring: Tools to maximize safety and margins

How Glasstrail makes it easier for MSPs to protect their service margins with management tools.

Andrew Taylor
Boards of Directors: Moving from perimeter cyber risk to opportunity

Boards of Directors: Moving from perimeter cyber risk to opportunity

An outline of questions and considerations for Board Members when discussing their external attack surface status.

External attack surface management vs vulnerability scanning

External attack surface management vs vulnerability scanning

Outlines the similarities and differences between external attack surface management and vulnerability scanning.

Liz Knight
How does Glasstrail compare to penetration testing?

How does Glasstrail compare to penetration testing?

A comparison of one-off penetration testing with regular scanning with Glasstrail? Get the low down here.

Andrew Taylor
How to apply attack surface management to the Mitre ATT&CK framework?

How to apply attack surface management to the Mitre ATT&CK framework?

Threat detection capability, attack surface management and Mitre ATT&CK. See how they hang together.

Liz Knight