News & Blog

Keep up to date about Glasstrail

Using external attack surface management tools to validate that your security controls meet SOC 2 standards

Using external attack surface management tools to validate that your security controls meet SOC 2 standards

Tips to improve the effectiveness of your security controls for SOC2

Andrew Taylor
Email hardening: When to use SPF, DKIM, and DMARC to reduce security risks

Email hardening: When to use SPF, DKIM, and DMARC to reduce security risks

DKIM, DMARC, and SPF - what are they and when should they be used? And why it's best to use all three.

Andrew Taylor
Why your cyber security posture matters when selling your business

Why your cyber security posture matters when selling your business

Cyber security considerations when preparing your business for sale.

Andrew Taylor
What are the cyber security considerations for mergers and acquisitions?

What are the cyber security considerations for mergers and acquisitions?

Why external attack surface scanning is a must have when you're undertaking a M&A.

Andrew Taylor
New feature: Integrating Glasstrail into your monitoring tools

New feature: Integrating Glasstrail into your monitoring tools

Integrating with webhooks and cURL, Glasstrail lets you subscribe to the findings of interest to you.

Andrew Taylor
Deepening attack surface scans with OWASP Top 10

Deepening attack surface scans with OWASP Top 10

Glasstrail now includes several key OWASP Top 10 findings.

Liz Knight
GPT - Hacks made easy

GPT - Hacks made easy

What does it mean when hackers have GPT technology at their disposal? We can expect better, more automated attacks and a lower barrier to entry. The implication for organisations is that there is never a better time to step up your defences than now.

Andrew Taylor
MSPs and external attack surface monitoring: Tools to maximize safety and margins

MSPs and external attack surface monitoring: Tools to maximize safety and margins

How Glasstrail makes it easier for MSPs to protect their service margins with management tools.

Andrew Taylor
Boards of Directors: Moving from perimeter cyber risk to opportunity

Boards of Directors: Moving from perimeter cyber risk to opportunity

An outline of questions and considerations for Board Members when discussing their external attack surface status.

External attack surface management vs vulnerability scanning

External attack surface management vs vulnerability scanning

Outlines the similarities and differences between external attack surface management and vulnerability scanning.

Liz Knight
How does Glasstrail compare to penetration testing?

How does Glasstrail compare to penetration testing?

A comparison of one-off penetration testing with regular scanning with Glasstrail? Get the low down here.

Andrew Taylor
How to apply attack surface management to the Mitre ATT&CK framework?

How to apply attack surface management to the Mitre ATT&CK framework?

Threat detection capability, attack surface management and Mitre ATT&CK. See how they hang together.

Liz Knight