March 5, 2024
Continuous Assessment and Reporting
Granular Cloud and SaaS Exposure Result Management Enhancement
ThreatNG remains at the forefront of comprehensive threat management with its latest enhancement: the granular "suppression" capability for Cloud and SaaS Exposure Investigation Module findings. This cutting-edge feature underscores our commitment to providing robust and user-centric solutions, empowering organizations to tailor their security approach to their unique risk profile. With this capability, users gain heightened control over their security posture, allowing them to selectively acknowledge and designate specific findings for suppression during subsequent discovery scans and assessments within the investigation modules. By streamlining the investigation process and enabling proactive risk mitigation, ThreatNG empowers organizations to stay ahead of emerging threats and confidently safeguard their digital assets.
Assess, Examine, and Highlight
Dark Web Presence Context-Aware Keyword Analysis Enhancement
ThreatNG has enhanced the capability of the associated Word List policy definition for the Dark Web Presence Investigation Module. This enhancement allows users to input a broader range of terms, enabling a more refined and adaptable approach to threat detection and risk assessment. The "word list" feature empowers users to create dynamic and context-aware keyword lists by inputting keywords, phrases, or patterns relevant to their industry, brand, or potential threats. The system then intelligently analyzes these inputs, identifying related terms, synonyms, and linguistic variations to ensure comprehensive coverage of relevant content. By leveraging a deep understanding of nuanced language, this enhancement enables users to fine-tune their threat detection strategies, improving the accuracy of identifying potential risks and significantly reducing false positives. With ThreatNG's enhanced capability, users can proactively stay ahead of emerging threats, maintain brand integrity, and safeguard their digital assets with precision and flexibility like never before.
Reporting and Sharing
Time-Comparative Analysis in Delta Reporting
Transform reactive insights into proactive foresight. Our enhanced Delta Reporting capability lets you compare discovery and assessment point-in-time results across two points. This functionality will enable you to:
Uncover emerging threats: Identify newly discovered assets, vulnerabilities, and exposures over time, enabling you to prioritize remediation efforts before attackers exploit them.
Measure security improvement: Quantify the effectiveness of your security initiatives by tracking changes in your security posture and ratings over time.
Gain deeper risk context: Understand the evolution of your digital risk landscape, allowing you to make informed decisions about resource allocation and strategic adjustments to your security posture.
With time-comparative analysis, Delta Reporting becomes a powerful tool for proactive risk management, helping you stay ahead of the curve in today's ever-evolving threat landscape.
Reporting and Presentation Optimization for Large Data Sets
Enhancements in load time ensure a faster and more responsive user experience within the ThreatNG platform. It facilitates quicker access to critical information and allows teams to analyze and respond to potential threats efficiently.
eXposure Summary Categorical Presentation and Enumeration Enhancements
Categorical presentation and enumeration enhancements now provide users with a more comprehensive easy-to-read overview of the presence of standard web technologies like JavaScript (JS), JSON (JavaScript Object Notation), JSP (Jakarta Server Pages), Python, HTML, and PHP (Hypertext Preprocessor), to file types such as Spreadsheet Files (example, Microsoft Excel), TXT (Text File Document), and BAK (Backup). The eXposure Summary delivers a detailed breakdown of the organization's digital footprint. Further, it highlights the presence of XML (Extensible Markup Language), Admin Pages, Emails, and APIs, enabling users to quickly identify and prioritize potential security risks across their infrastructure.
Ransomware Report Enhancement
In response to the evolving threat landscape, ThreatNG is proud to announce enhancements to the Technology Stack Investigation Module within our comprehensive Ransomware Report. This module now provides organizations with even deeper insights into their susceptibility to ransomware vectors by offering improved discovery, assessment, and presentation of findings. Leveraging advanced algorithms and threat intelligence, the updated module delivers more accurate assessments of an organization's technology stack vulnerabilities, including Internet-Facing Vulnerabilities, Misconfigurations, BEC & Phishing risks, Precursor Malware Infections, and threats from Third Parties and Managed Service Providers. Through X Susceptibility and eXposure scoring, our report offers a holistic view of an organization's attack surface and digital footprint, empowering stakeholders to prioritize mitigation efforts effectively. With these enhancements, ThreatNG continues to help organizations fortify their defenses against ransomware and other cyber threats.
Knowledge Base
DarcRadar Knowledgebase Enhancement
DarcRadar, which stands for Data Aggregation Reconnaissance for Cyber Risk Appetite and Representation, revolutionizes how users understand and manage their digital risk landscape. This capability empowers users to precisely define their risk appetite and measure it against industry standards, best practices, and hygiene benchmarks.
By updating the risk levels, reasoning, recommendations, and references of the DarcRadar capability on the ThreatNG platform, users are empowered to make informed decisions about their cybersecurity posture. Whether prioritizing remediation efforts, allocating resources more effectively, or aligning security strategies with organizational goals, our enhanced platform provides the actionable intelligence needed to stay ahead of evolving threats.