Blog
The latest articles, news, research, and resources from the Nagomi team.
Automate Your Asset Inventory For Effective Threat Protection
By Jonathan Meler – Co-founder & Chief Product Officer There’s a simple truth that too…
Blog
2024, the Year We Rethought Security: Here’s What’s Next
By Emanuel Salmona – Co-founder & CEO At Nagomi, we’re not simply reacting to challenges—we’re … Read Post
Blog
Shift Happens: How to Future-Proof Your Identity Posture Today
By Shai Mendel – Co-Founder & CTO As businesses embrace digital transformation, identity management has … Read Post
Blog
Beyond the Maze: A Practical Guide to Proactive Cybersecurity Solutions
By Sofia Piedrahita – Business Strategy & Product Marketing For security leaders, the daily challenge … Read Post
Blog
Compensating Controls: Maximizing Security with What You Already Have
By Emanuel Salmona – Co-founder & CEO As a CEO in cybersecurity, I’ve had countless … Read Post
Blog
What is Security Assurance? A Blueprint in an Evolving Threat Landscape
By Jonathan Meler – Co-founder & Chief Product Officer In today’s rapidly evolving threat landscape, … Read Post
Blog
Nagomi Security’s ‘Cool Vendor’ Nod: Smarter, Faster Security Operations
By Sofia Piedrahita – Business Strategy & Product Marketing As a growing player in the … Read Post
Blog
Mastering the Balance: How to Consolidate Security Tools While Keeping Best-of-Breed Solutions
By Emanuel Salmona – Co-founder & CEO In the fast-paced world of cybersecurity, organizations are … Read Post
Blog
Operationalizing Threat Intelligence: A CISO’s Guide to Turning Threat Noise into Action
By Emanuel Salmona – Co-founder & CEO What is Cyber Threat Intelligence? Cyber threat intelligence … Read Post
Blog
Prioritizing MITRE ATT&CK Techniques for Remote Services
The fifth, and final, in a five part series exploring how security teams can identify … Read Post
Blog
Announcing the New “Threats in the News” Feature in Nagomi – Adding Context to Operationalize End-to-End Exposure Management
Nagomi’s new “Threats in the News” feature is transforming the way cybersecurity teams manage and … Read Post
Blog
Prioritizing MITRE ATT&CK Techniques for Valid Accounts
The fourth in a five part series exploring how security teams can identify the most … Read Post
Blog
Prioritizing MITRE ATT&CK Techniques for OS Credential Dumping
The third in a five part series exploring how security teams can identify the most … Read Post