Your Third Party Risk Management Framework Guide

Exposure Management, Information security

Amit Ashbel December 8, 2025

A third-party risk management (TPRM) framework isn't just a compliance document; it's the strategic plan...
 
 
 
 

Information security

Your Guide to an Information Security Policy That Works

Amit Ashbel December 7, 2025

An information security policy is the rulebook for your company's cyber defense. It lays out...
 
 

Research

Hidden Gems in Entra ID: The Cost and Complexity of Cleaning Stal...

Nitzan Pomerantz December 7, 2025

I spend a considerable amount of time deep-diving into documentation. It’s part of the job...
 
 

Information security

Modern Incident Management Procedures Guide

Barak Klinghofer December 7, 2025

Incident management procedures are the specific, documented steps your team takes to handle a security...
 
 

Information security, Preemptive Security

Security Configuration Management: From Lists and Alerts to Real ...

Amit Ashbel November 30, 2025

Let's move past the dry, textbook definitions. Think of security configuration management (SCM) as the...
 
 

Exposure Management, Exposure Remediation, Information security, Preemptive Security

A Practical Guide to Attack Surface Management

Amit Ashbel November 24, 2025

Think of your company’s technology stack like a physical building. Every server, cloud account, SaaS...
 
 

Information security

Vulnerability Assessment and Penetration Testing: A Practical Gui...

Barak Klinghofer November 23, 2025

Think of a vulnerability assessment as an inspector walking the perimeter of your building, systematically...
 
 

Information security

A Practical Guide to Cloud Security Posture Management

Amit Ashbel November 20, 2025

Cloud Security Posture Management (CSPM) is essentially a continuous health check for your entire cloud...
 
 

Exposure Remediation, Information security, Preemptive Security

How to Improve Security Posture: A Practical Framework for Real F...

Amit Ashbel November 19, 2025

To improve security posture, you have to stop just identifying vulnerabilities and start actively fixing...
 
 

Information security

A Guide to Identity Security Posture Management

Roy Peretz November 18, 2025

Let's be honest, the old ways of managing digital identities don't cut it anymore. We...
 
 

Exposure Management, Exposure Remediation, Information security

From Assessment to Action: A Guide to Your Cybersecurity Posture...

Barak Klinghofer November 17, 2025

A cybersecurity posture assessment is more than just a scan or an audit; it's a...
 
 

Exposure Management

Executive Briefing: The Preemptive Pivot – Securing the Glo...

Amit Ashbel November 16, 2025

Why this matters now? Attackers are using AI to speed up recon, payload engineering, and...
 
 

Exposure Management, Information security, Preemptive Security

The Exposure Management Reckoning: Why 2026 Demands a New Cyberse...

Barak Klinghofer November 9, 2025

By Barak Klinghofer, CEO and Co-Founder, Reclaim Security Executive Summary Detection and response kept many...
 
 

Exposure Management, Exposure Remediation, Information security

AI-Powered Attack Surface Explosion: Weaponizing CTEM for Microso...

Amit Ashbel October 27, 2025

Attackers are now using AI to move faster, blend in better, and exploit simple gaps...
 
 

Information security

AI-Powered Threat Actors: Why Exposure Remediation Must Evolve Be...

Amit Ashbel October 15, 2025

The New Generation of AI Threat Actors AI has become the ultimate force multiplier for...
 
 

Exposure Remediation, Information security

Why Cyber Hygiene Failures Keep Fueling Breaches (and How to Fix ...

Amit Ashbel September 29, 2025

Cybersecurity headlines are filled with million-dollar breaches, but when you peel back the layers, most...
 
 

Exposure Remediation, Information security, Research

Agentic AI in Cybersecurity: Why Teams Still Fear Taking Action, ...

Amit Ashbel September 22, 2025

Introduction: What Is Agentic AI, and How It’s Already All Around Us Agentic AI refers...
 
 

Information security

AI & Multi Cloud Adoption Is Outpacing Security: Close the Id...

Amit Ashbel September 15, 2025

TL;DR – What Security Leaders Need to Know Risk: Rapid growth of hybrid/multi‑cloud and AI platforms...
 
 

Exposure Management, Information security

Don’t Be a Tool: Why AI Attackers Are Laughing at Your Manual Fix...

Amit Ashbel September 8, 2025

Let’s be honest: most security professionals didn’t sign up to become glorified button-pushers. Yet here...
 
 

Information security, Preemptive Security

Preemptive Security at the Front Line: Making Your Stack Work Har...

Barak Klinghofer September 1, 2025

Series Recap Welcome to the third and final post in our “Preemptive Security at the...
 
 

Exposure Management, Research

QMR Is a Lifesaver—But It’s Not Enabled by Default

Ben Hunter August 25, 2025

Here’s How to Turn On Windows’ New Self-Healing Recovery Feature Before You Need It When...
 
 

Research

Change This OneDrive Setting Before It Leaks Your Corporate Data...

Ben Hunter August 13, 2025

A Quiet Microsoft Update Just Opened a Dangerous Door. Here’s How to Shut It Permanently....
 
 

Information security, Preemptive Security

Security Tool Optimization: How to Maximize Efficiency, ROI, and ...

Roy Peretz August 13, 2025

Learn how to optimize your security stack, reduce tool sprawl, and increase ROI with measurable...
 
 

Information security

Mastering Patch Tuesday in 2025: A Practitioner’s Guide to Stayin...

Roi Teveth August 12, 2025

Patch Tuesday: From Monthly Nuisance to Strategic Advantage Back in 2003, Microsoft introduced Patch Tuesday...
 
 

Information security

SOAR Security Tools Compared: Why Reclaim Is the Evolution Beyond...

Barak Klinghofer August 3, 2025

The SOAR Security Landscape in 2025 Security Orchestration, Automation, and Response (SOAR) platforms promised to...
 
 

Information security, Preemptive Security

Preemptive Security at the Front Line: Disarm Ransomware, Phishin...

Barak Klinghofer July 29, 2025

🔁 Continuing the Series In Part 1, we focused on hardening the front line of...
 
 

Exposure Remediation

How to Automate Vulnerability Remediation at Scale

Barak Klinghofer July 22, 2025

In today’s security landscape, the volume and velocity of threats are matched only by the...
 
 

Exposure Management

Why Continuous Threat Exposure Management Is the Future of Securi...

Barak Klinghofer July 21, 2025

In an era where cyber threats evolve faster than teams can respond, security leaders are...
 
 

Information security, Preemptive Security

Preemptive Security at the Front Line: Strengthening Endpoint, Em...

Barak Klinghofer July 11, 2025

Series Introduction A Three-Part Series on Making Gartner’s Vision Actionable Security leaders are waking up...
 
 

Preemptive Security

Preemptive Security: Stop Chasing Findings, Start Eliminating Thr...

Barak Klinghofer July 7, 2025

For years, cybersecurity was a game of whack-a-mole: detect a breach; respond fast. But in...
 
 

Information security, Preemptive Security

My Take: Gartner’s “Emerging Tech – The Future of Exposure Manage...

Amit Ashbel June 26, 2025

June 2025, Gartner just published a research note that could very well define the next...
 
 

Exposure Remediation, Preemptive Security

Compensating Security Controls: Strengthening Cyber Defense

Roy Peretz June 23, 2025

Having spent years observing and advising organizations across diverse sectors, one constant challenge emerges: the...
 
 

Exposure Remediation

The End of Security Debt: Why Autonomous Security Controls Are a ...

Barak Klinghofer June 19, 2025

Every CISO knows the pain of security debt: unresolved findings that pile up faster than...
 
 

Information security

The Untold Story of Attack Surface Management: Securing the Futur...

Barak Klinghofer June 15, 2025

Imagine a fortress under siege, its walls constantly shifting as new towers are built and...
 
 

Exposure Remediation, Information security

Using AI to Maximize Your Security Posture and Minimize Threat Ex...

Roy Peretz June 12, 2025

If you work in enterprise security, you’ve felt it: the growing pressure to deliver airtight...
 
 

Exposure Remediation, Preemptive Security

Automated Security Remediation Guide: From Reactive to Proactive ...

Barak Klinghofer June 11, 2025

Introduction: A New Era of Cybersecurity The cybersecurity industry stands at a critical inflection point....
 
 

Information security

AI-Driven Cyber Threats in 2025: Why Zero Trust and Phishing‑Resi...

Barak Klinghofer June 10, 2025

Introduction The global cost of cybercrime is on a trajectory to exceed US$10.5 trillion by the...
 
 

Exposure Management

Exposure Management Business Case: Calculate ROI & Build Bud...

Barak Klinghofer June 8, 2025

When CISOs struggle to secure funding, it’s rarely due to lack of awareness. Boards understand...
 
 

Preemptive Security

The Foundation of Preemptive Cybersecurity: Why Automated Exposur...

Barak Klinghofer June 4, 2025

For decades, organizations have operated under the assumption that sophisticated detection systems and rapid response...
 
 

Exposure Remediation

CVE-2025-21298: Why This “Quiet” Misconfiguration Bug Shouldn’t B...

Roy Peretz June 3, 2025

This blog is part of our ongoing Threat Exposure Remediation series. Want to see how...
 
 

Exposure Remediation

Beyond Prioritization: Why Automated Security Remediation is the ...

Barak Klinghofer May 27, 2025

The cybersecurity industry has reached a breaking point. Despite investing billions in sophisticated vulnerability scanning...
 
 

Exposure Remediation, Preemptive Security

The Automated Moving Target Defense (ATMD) Paradox: Why Moving Ta...

Barak Klinghofer May 27, 2025

Imagine this: you’ve deployed advanced Automated Moving Target Defense (AMTD). Your network shifts, IPs rotate,...
 
 

Information security

Security Automation: The Complete 2025 Guide to Intelligent Cyber...

Amit Ashbel May 21, 2025

Transform your cybersecurity from reactive firefighting to proactive protection Table of contentsIntroduction: The $4.45 Million...
 
 

Exposure Remediation

The Rise of AI-Driven Threat Actors and the Urgent Need for Expos...

Barak Klinghofer May 18, 2025

The Rise of AI-Driven Threat Actors and the Urgent Need for Exposure Remediation In recent...
 
 

Exposure Remediation, Preemptive Security

Automated Security Remediation: How PIPE™ Technology Eliminates t...

Barak Klinghofer May 14, 2025

Table of contentsWhy Traditional Automation Fails at ScaleThe Productivity Paradox: When Security Wins but Business...
 
 

Information security

The Security Defocus Problem: When Too Many Tools Increase Risk...

Barak Klinghofer May 12, 2025

Security tool sprawl is becoming one of the biggest hidden risks in enterprise cybersecurity. Teams...
 
 

Exposure Management, Information security

Threat Exposure Management: Why Prioritization Alone Can’t ...

Barak Klinghofer May 7, 2025

Threat exposure management used to be about visibility. Prioritize your findings, patch what you can,...
 
 

Exposure Remediation

Threat Exposure Remediation: What It Is and Why It’s the Future o...

Barak Klinghofer May 5, 2025

Threat exposure remediation is quickly becoming one of the most urgent, yet underinvested areas in...
 
 

Information security

Why Continuous Configuration Management Is Crucial for Enterprise...

Barak Klinghofer April 28, 2025

The Invisible Risk: Security Tools Can Quietly Fail Even the best security stacks can falter...
 
 

Information security

Reclaiming Focus in the Age of Security Chaos

Barak Klinghofer April 27, 2025

Introduction: The New Reality of Security Operations Once upon a time, security was simple. It...
 
 

Information security

The Elusive “Single Pane of Glass”

Barak Klinghofer April 18, 2025

Why Security Unification Keeps Failing (and What to Do Instead) By Barak Klinghofer, CEO and...
 
 

Information security

The Path to Autonomous AI Agents in Cybersecurity: A Realistic 20...

Barak Klinghofer April 18, 2025

Thanks for joining me to explore a topic I’m deeply passionate about: the evolving role...
 
 

Information security

How Secure Are We? Why the Cybersecurity Metrics We Use May Be Mi...

Barak Klinghofer April 10, 2025

By Barak Klinghofer, CEO & Co-Founder, Reclaim Security Growing up with MacGyver and The A-Team,...
 
 

Information security

From Prevention to Assume Breach to Shift Left — Why Cybersecurit...

Barak Klinghofer April 8, 2025

The Pendulum Is Broken Introduction: The Evolution of Cybersecurity Strategy Cybersecurity strategies haven’t evolved—they’ve oscillated....