Author: Roy Peretz
A Modern Guide to the Remediation of Vulnerabilities
Let's be honest: for most security leaders, the remediation of vulnerabilities feels like a losing...
Exposure Management, Information security, Posture Management, Preemptive Security
Create a Cloud Computing Security Policy That Works
A good cloud computing security policy is more than just a document; it's an operational...
A Guide to Identity Security Posture Management
Let's be honest, the old ways of managing digital identities don't cut it anymore. We...
Information security, Preemptive Security
Security Tool Optimization: How to Maximize Efficiency, ROI, and Resilience
Learn how to optimize your security stack, reduce tool sprawl, and increase ROI with measurable...
Exposure Remediation, Preemptive Security
Compensating Security Controls: Strengthening Cyber Defense
Having spent years observing and advising organizations across diverse sectors, one constant challenge emerges: the...
Exposure Remediation, Information security
Using AI to Maximize Your Security Posture and Minimize Threat Exposure
If you work in enterprise security, you’ve felt it: the growing pressure to deliver airtight...
CVE-2025-21298: Why This “Quiet” Misconfiguration Bug Shouldn’t Be Ignored
This blog is part of our ongoing Threat Exposure Remediation series. Want to see how...