• Facebook
  • Twitter
  • Instagram
  • Linkedin
  • Youtube
  • Home
  • Products
    • RidgeBot Overview
    • Methodology: Penetration Testing
    • Methodology: Adversary Cyber Emulation
    • 10 RidgeBot Features
    • Surviving Ransomware
    • Post Exploitation
    • OWASP Top 10 Compliance
    • Apache log4j Vulnerability
    • MSSP/MDR Solution
  • Resources
  • Use Cases
  • Partners
    • Overview
    • Technology Partners
    • Partner Portal Login
  • Services
  • Blog
  • About Us
  • English
    • Español
    • Português
    • Italiano
Select Page
Exposure Management for Managed Detection and Response

Exposure Management for Managed Detection and Response

by Steve Karkula | Aug 18, 2022 | AI in Automated Pen Test, Ridge Security

Managed Detection and Response (MDR) is a fast-growing segment of the broader MSSP market. MDR services include threat monitoring, detection, and response from a remote security operations center (SOC). These functions allow organizations to detect, analyze, and...
Overview of ProxyLogon Vulnerability in Microsoft Exchange Servers

Overview of ProxyLogon Vulnerability in Microsoft Exchange Servers

by Steve Karkula | Jun 21, 2022 | Pen Test Technical Tips, RidgeBOT

Hafnium is a cyber espionage group with alleged ties to the Chinese government. They are responsible for a global wave of cyberattacks and data breaches which began in January 2021 after several zero-day exploits were discovered in Microsoft Exchange Servers.  It...
The Most Exploited Vulnerabilities in 2021

The Most Exploited Vulnerabilities in 2021

by Steve Karkula | May 16, 2022 | AI in Automated Pen Test

The Cybersecurity & Infrastructure Security Agency (CISA) leads the U.S. effort to understand, manage, and reduce risk to cyber and physical infrastructure. In concert with other agencies, they publish a list of the top vulnerabilities that are routinely exploited...

Recent Posts

  • RidgeBot Automated Pentesting Strengthens Security Across the DevSecOps SDLC
  • Eliminate Ransomware Lurking Within Your IT Environment
  • Why Are Insider Threats on the Rise?
  • How to Implement a Risk-Based Approach to Cybersecurity
  • Overconfidence in Technology Can Promote a Costly False Sense of Security

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • July 2019
  • April 2019

RidgeSecurity.ai

  • Home
  • Products
  • Resources
  • Use Cases
  • Partners
  • Services
  • Blog
  • About Us
© 2023 Ridge Security, Inc.    Privacy Policy   Terms and Conditions