Resource Library

Pine Gate Renewables: Defeating Ransomware and Advanced Persistent Threats in Just Four Months

Pine Gate Renewables faced the dual challenge of scaling operations while defending against the sophisticated threats increasingly targeting the energy sector

Pine Gate Renewables: Defeating Ransomware and Advanced Persistent Threats in Just Four Months
 
 
 

Agentic Remediation: The Missing Link in CTEM Mobilization

January 12, 2026

Security teams don’t suffer from a lack of data. They suffer from...
 
 

Security & Automation: Fix What Other Tools Only Flag

January 11, 2026

Security and automation are no longer just buzzwords; they represent a fundamental...
 
 

A Modern Guide to Vulnerability and Threat Management

January 8, 2026

Let's be honest: for most security teams, traditional vulnerability and threat management...
 
 

A Modern Guide to the Remediation of Vulnerabilities

January 7, 2026

Let's be honest: for most security leaders, the remediation of vulnerabilities feels...
 
 

A Practical Guide to Identity and Governance Administration (IGA)...

January 6, 2026

Identity and Governance Administration (IGA) is the framework that businesses use to...
 
 

Stop Managing Security. Start Eliminating Threats: A Practical Gu...

January 6, 2026

True management of exposure isn't about generating longer lists of potential problems....
 
 

Create a Cloud Computing Security Policy That Works

December 28, 2025

A good cloud computing security policy is more than just a document;...
 
 

A Modern Vulnerability Management Procedure

December 22, 2025

A solid vulnerability management procedure is a living cycle of finding, prioritizing,...
 
 

From Lists to Fixes: Threat and Vulnerability Management Done Rig...

December 21, 2025

Threat and vulnerability management isn't just about finding problems. It's the ongoing...
 
 

Cyber Risk Management Framework: How to Turn Strategy Into Securi...

December 21, 2025

A cyber risk management framework is a structured set of guidelines your...
 
 

Top CTEM Vendors for 2025: From Discovery to Remediation

December 17, 2025

Building a Continuous Threat Exposure Management (CTEM) program is now a primary...
 
 

How to Turn Your Network Security Policy Into a Resilient, Self-H...

December 14, 2025

This guide walks through how to design a business-aware network security policy...
 
 

Incident Response Playbook Template: Your Free Guide

December 11, 2025

Let's be honest. That incident response plan your team wrote to satisfy...
 
 

Your Third Party Risk Management Framework Guide

December 8, 2025

A third-party risk management (TPRM) framework isn't just a compliance document; it's...
 
 

Your Guide to an Information Security Policy That Works

December 7, 2025

An information security policy is the rulebook for your company's cyber defense....
 
 

Hidden Gems in Entra ID: The Cost and Complexity of Cleaning Stal...

December 7, 2025

I spend a considerable amount of time deep-diving into documentation. It’s part...
 
 

Modern Incident Management Procedures Guide

December 7, 2025

Incident management procedures are the specific, documented steps your team takes to...
 
 

Pine Gate Renewables: Defeating Ransomware and Advanced Persisten...

November 30, 2025

Executive Summary The key success factor was Reclaim's ability to rapidly analyze...
Ransomware resilience
47% More
APT resilience
64% More
Overall Resilience
23% More
 
 

Security Configuration Management: From Lists and Alerts to Real ...

November 30, 2025

Let's move past the dry, textbook definitions. Think of security configuration management...
 
 

A Practical Guide to Attack Surface Management

November 24, 2025

Think of your company’s technology stack like a physical building. Every server,...
 
 

Vulnerability Assessment and Penetration Testing: A Practical Gui...

November 23, 2025

Think of a vulnerability assessment as an inspector walking the perimeter of...
 
 

A Practical Guide to Cloud Security Posture Management

November 20, 2025

Cloud Security Posture Management (CSPM) is essentially a continuous health check for...
 
 

How to Improve Security Posture: A Practical Framework for Real F...

November 19, 2025

To improve security posture, you have to stop just identifying vulnerabilities and...
 
 

A Guide to Identity Security Posture Management

November 18, 2025

Let's be honest, the old ways of managing digital identities don't cut...
 
 

From Assessment to Action: A Guide to Your Cybersecurity Posture...

November 17, 2025

A cybersecurity posture assessment is more than just a scan or an...
 
 

Executive Briefing: The Preemptive Pivot – Securing the Glo...

November 16, 2025

Why this matters now? Attackers are using AI to speed up recon,...
 
 

The Exposure Management Reckoning: Why 2026 Demands a New Cyberse...

November 9, 2025

By Barak Klinghofer, CEO and Co-Founder, Reclaim Security Executive Summary Detection and...
 
 

The Exposure Management Reckoning

November 9, 2025

 
 

AI-Powered Attack Surface Explosion: Weaponizing CTEM for Microso...

October 27, 2025

Attackers are now using AI to move faster, blend in better, and...
 
 

AI-Powered Threat Actors: Why Exposure Remediation Must Evolve Be...

October 15, 2025

The New Generation of AI Threat Actors AI has become the ultimate...
 
 

Why Cyber Hygiene Failures Keep Fueling Breaches (and How to Fix ...

September 29, 2025

Cybersecurity headlines are filled with million-dollar breaches, but when you peel back...
 
 

Agentic AI in Cybersecurity: Why Teams Still Fear Taking Action, ...

September 22, 2025

Introduction: What Is Agentic AI, and How It’s Already All Around Us...
 
 

AI & Multi Cloud Adoption Is Outpacing Security: Close the Id...

September 15, 2025

TL;DR – What Security Leaders Need to Know Risk: Rapid growth of hybrid/multi‑cloud...
 
 

Don’t Be a Tool: Why AI Attackers Are Laughing at Your Manual Fix...

September 8, 2025

Let’s be honest: most security professionals didn’t sign up to become glorified...
 
 

Preemptive Security at the Front Line: Making Your Stack Work Har...

September 1, 2025

Series Recap Welcome to the third and final post in our “Preemptive...
 
 

QMR Is a Lifesaver—But It’s Not Enabled by Default

August 25, 2025

Here’s How to Turn On Windows’ New Self-Healing Recovery Feature Before You...
 
 

Change This OneDrive Setting Before It Leaks Your Corporate Data...

August 13, 2025

A Quiet Microsoft Update Just Opened a Dangerous Door. Here’s How to...
 
 

Security Tool Optimization: How to Maximize Efficiency, ROI, and ...

August 13, 2025

Learn how to optimize your security stack, reduce tool sprawl, and increase...
 
 

Mastering Patch Tuesday in 2025: A Practitioner’s Guide to Stayin...

August 12, 2025

Patch Tuesday: From Monthly Nuisance to Strategic Advantage Back in 2003, Microsoft...
 
 

SOAR Security Tools Compared: Why Reclaim Is the Evolution Beyond...

August 3, 2025

The SOAR Security Landscape in 2025 Security Orchestration, Automation, and Response (SOAR)...
 
 

Preemptive Security at the Front Line: Disarm Ransomware, Phishin...

July 29, 2025

🔁 Continuing the Series In Part 1, we focused on hardening the...
 
 

How to Automate Vulnerability Remediation at Scale

July 22, 2025

In today’s security landscape, the volume and velocity of threats are matched...
 
 

Why Continuous Threat Exposure Management Is the Future of Securi...

July 21, 2025

In an era where cyber threats evolve faster than teams can respond,...
 
 

Preemptive Security at the Front Line: Strengthening Endpoint, Em...

July 11, 2025

Series Introduction A Three-Part Series on Making Gartner’s Vision Actionable Security leaders...
 
 

Reclaim Security Data Sheet

July 11, 2025

 
 

Preemptive Security: Stop Chasing Findings, Start Eliminating Thr...

July 7, 2025

For years, cybersecurity was a game of whack-a-mole: detect a breach; respond...
 
 

My Take: Gartner’s “Emerging Tech – The Future of Exposure Manage...

June 26, 2025

June 2025, Gartner just published a research note that could very well...
 
 

Compensating Security Controls: Strengthening Cyber Defense

June 23, 2025

Having spent years observing and advising organizations across diverse sectors, one constant...
 
 

Aqua Security: Data Driven Security Optimization with Maximum ROI...

June 19, 2025

Executive Summary Aqua Security, a leading cybersecurity company specializing in cloud-native security...
Exposure to phishing attacks
85% Less
Time spent on configuration management
80% Less
ROI through optimization of existing security stack
63% More
 
 

The End of Security Debt: Why Autonomous Security Controls Are a ...

June 19, 2025

Every CISO knows the pain of security debt: unresolved findings that pile...
 
 

The Untold Story of Attack Surface Management: Securing the Futur...

June 15, 2025

Imagine a fortress under siege, its walls constantly shifting as new towers...
 
 

Using AI to Maximize Your Security Posture and Minimize Threat Ex...

June 12, 2025

If you work in enterprise security, you’ve felt it: the growing pressure...
 
 

Automated Security Remediation Guide: From Reactive to Proactive ...

June 11, 2025

Introduction: A New Era of Cybersecurity The cybersecurity industry stands at a...
 
 

AI-Driven Cyber Threats in 2025: Why Zero Trust and Phishing‑Resi...

June 10, 2025

Introduction The global cost of cybercrime is on a trajectory to exceed...
 
 

Exposure Management Business Case: Calculate ROI & Build Bud...

June 8, 2025

When CISOs struggle to secure funding, it’s rarely due to lack of...
 
 

The Foundation of Preemptive Cybersecurity: Why Automated Exposur...

June 4, 2025

For decades, organizations have operated under the assumption that sophisticated detection systems...
 
 

Telit Cinterion: Defeating Ransomware While Maximizing ROI of Exi...

June 4, 2025

Executive Summary Telit Cinterion, a global end-to-end IoT enabler that provides complete...
in ransomware attack 
scenarios within weeks
80% Reduction
Time spent on 
manual remediation
90% Less
Tech Stack
efficiency
Maximized
 
 

CVE-2025-21298: Why This “Quiet” Misconfiguration Bug Shouldn’t B...

June 3, 2025

This blog is part of our ongoing Threat Exposure Remediation series. Want...
 
 

From Reactive to Preemptive Security: Outsmart AI Threats Before ...

June 1, 2025 06:00 - 10:00

 
 

Beyond Prioritization: Why Automated Security Remediation is the ...

May 27, 2025

The cybersecurity industry has reached a breaking point. Despite investing billions in...
 
 

The Automated Moving Target Defense (ATMD) Paradox: Why Moving Ta...

May 27, 2025

Imagine this: you’ve deployed advanced Automated Moving Target Defense (AMTD). Your network...
 
 

Security Automation: The Complete 2025 Guide to Intelligent Cyber...

May 21, 2025

Transform your cybersecurity from reactive firefighting to proactive protection Table of contentsIntroduction:...
 
 

The Rise of AI-Driven Threat Actors and the Urgent Need for Expos...

May 18, 2025

The Rise of AI-Driven Threat Actors and the Urgent Need for Exposure...
 
 

Automated Security Remediation: How PIPE™ Technology Eliminates t...

May 14, 2025

Table of contentsWhy Traditional Automation Fails at ScaleThe Productivity Paradox: When Security...
 
 

The Security Defocus Problem: When Too Many Tools Increase Risk...

May 12, 2025

Security tool sprawl is becoming one of the biggest hidden risks in...
 
 

Threat Exposure Management: Why Prioritization Alone Can’t ...

May 7, 2025

Threat exposure management used to be about visibility. Prioritize your findings, patch...
 
 

Threat Exposure Remediation: What It Is and Why It’s the Future o...

May 5, 2025

Threat exposure remediation is quickly becoming one of the most urgent, yet...
 
 

Why Continuous Configuration Management Is Crucial for Enterprise...

April 28, 2025

The Invisible Risk: Security Tools Can Quietly Fail Even the best security...
 
 

Reclaiming Focus in the Age of Security Chaos

April 27, 2025

Introduction: The New Reality of Security Operations Once upon a time, security...
 
 

The Elusive “Single Pane of Glass”

April 18, 2025

Why Security Unification Keeps Failing (and What to Do Instead) By Barak...
 
 

The Path to Autonomous AI Agents in Cybersecurity: A Realistic 20...

April 18, 2025

Thanks for joining me to explore a topic I’m deeply passionate about:...
 
 

How Secure Are We? Why the Cybersecurity Metrics We Use May Be Mi...

April 10, 2025

By Barak Klinghofer, CEO & Co-Founder, Reclaim Security Growing up with MacGyver...
 
 

From Prevention to Assume Breach to Shift Left — Why Cybersecurit...

April 8, 2025

The Pendulum Is Broken Introduction: The Evolution of Cybersecurity Strategy Cybersecurity strategies...