Blog
The latest articles, news, research, and resources from the Nagomi team.
Nagomi Recognized in the Gartner® Hype Cycle™ for Security Operations: A Milestone for Automated Security Control Assessment
The Hype Cycle™ for Security Operations has recently been unveiled, and we believe it’s already…
Blog
Are Your Cybersecurity Tools Doing Their Job?
Nagomi Security’s CEO, Emanuel Salmona, puts it plainly: “Most breaches could be avoided with the … Read Post
Blog
Silent Threat Unveiled: The UEFI Firmware Vulnerability (CVE-2024-0762)
By Lior Tenne – Security Researcher A critical security flaw (CVE-2024-0762) in Phoenix SecureCore UEFI … Read Post
Blog
Prioritizing MITRE ATT&CK Techniques for Command & Scripting Interpreters
The second in a five part series looking at where security teams can understand the … Read Post
Blog
Heavy Hitter: Nagomi Named to Redpoint’s InfraRed 55 Days After Emerging from Stealth
Since emerging from stealth in April, Nagomi Security has swiftly captured attention as one of … Read Post
Blog
Leading the Charge in Proactive Security, Nagomi Security Joins Elite Ranks of Cloud Infrastructure Innovators
Nagomi Security, the leader in proactive security and threat exposure management, proudly announces its inclusion … Read Post
Blog
Prioritizing MITRE ATT&CK Techniques for Phishing Defense
The first in a series looking at where security teams can understand the most commonly … Read Post
Blog
What is Black Basta Ransomware and How Can Security Teams Protect Against It?
What it is, latest developments, and how security teams can ensure their security tools are … Read Post
Blog
What is Credential Stuffing and How Can Cybersecurity Teams Use Existing Tools to Minimize the Threat?
By Lior Tenne – Senior Security Researcher At Nagomi, we’ve seen that 80% of breaches … Read Post
Blog
The Nagomi Story
Learn about the problem we’re solving, how we do it, and how Nagomi helps customers … Read Post