📢 NetSPI Acquires Hubble, Adds CAASM to complement its industry leading EASM and extend its proactive security portfolio Today, we announce the acquisition of Hubble, a Northern Virginia-based cyber asset attack surface management (CAASM) and cybersecurity posture management solution. CAASM enhances existing external attack surface management (EASM) capabilities for NetSPI customers by providing an accurate and holistic inventory of both external and internal cyber assets. NetSPI CEO Aaron Shilts said, “You can’t secure what you don’t have visibility into. We support the most trusted brands on Earth giving them visibility into external/cloud assets and exposures. With Hubble’s CAASM solution, we can provide comprehensive, 360-degree visibility while delivering telemetry and insights across the entire IT estate.” Read the official announcement to learn more: https://lnkd.in/gXT8k8vv
NetSPI
Computer and Network Security
Minneapolis, Minnesota 42,550 followers
The Proactive Security Solution
About us
NetSPI is the proactive security solution used to discover, prioritize, and remediate security vulnerabilities of the highest importance, so businesses can protect what matters most. Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI helps security teams take a proactive approach to cybersecurity with more clarity, speed, and scale than ever before. By continually advancing solutions such as Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Breach and Attack Simulation (BAS), NetSPI goes beyond the noise to deliver high impact results and recommendations based on business needs, so customers can protect their priorities, perform better, and innovate with confidence. NetSPI secures the most trusted brands on Earth, including nine of the top 10 U.S. banks, four of the top five leading cloud providers, three of the five largest healthcare companies, four MAMAA companies, seven of the top 10 U.S. retailers & e-commerce companies, and many of the Fortune 500. NetSPI is headquartered in Minneapolis, MN, with offices across the U.S., Canada, the UK, and India.
- Website
-
https://www.netspi.com/
External link for NetSPI
- Industry
- Computer and Network Security
- Company size
- 501-1,000 employees
- Headquarters
- Minneapolis, Minnesota
- Type
- Privately Held
- Founded
- 2001
- Specialties
- Manual Penetration Testing, Financial Services Information Security, Vulnerability Management, Application Code Review, Application Security, Red Team, Application Security Program Development, Web Security, Information Security, Attack Surface Management, and Proactive Security
Locations
-
Primary
241 5th Ave N
Suite 1200
Minneapolis, Minnesota 55401, US
Employees at NetSPI
Updates
-
“Well-placed AI security tests need to be part of the proactive security journey in protecting your generative AI investments.” NetSPI Managing Director, Phil Morris discusses how to effectively protect generative AI initiatives and how to get buy-in for safer deployment in our latest blog. Learn more: https://ow.ly/Ht4S50SOaLJ
-
-
We’ll see you poolside. Dive in headfirst with NetSPI at Mandalay Bay’s Daylight Beach Club during #BlackHatUSA for our networking event! Register today: https://ow.ly/lrhN50SxRqU
-
-
Access granted... or not. NetSPI Director of Cloud Pentesting Thomas E. used weak open group join settings to escalate privileges in Google Cloud. Read this blog post to learn how to detect these attack paths and opportunities for Hunting and Detection: https://lnkd.in/g8BBtm2V
-
-
Heading to Hacker Summer Camp next week? Catch every opportunity to find #TeamNetSPI onsite: https://lnkd.in/ganrWQfr A few highlights: 🎤 Demo The NetSPI Platform and get a first look at CAASM at booth #2750. 🌊 RSVP to our Poolside Happy Hour at Mandalay Bay’s Daylight Beach Club 🗣️ Hear NetSPI Chief Product Officer Vinay Anand and Chief Technology Officer Tom Parker talk about enhancing CTEM through the combination of EASM and CAASM. 💡 Pew pew! Dynamic duo Larry Trowell "Patch" and Samantha Isabelle Beaumont "Panther" will unveil budget-friendly light-based hardware security tooling. 🐍 Scott Weston presents GCPwn: a Python toolset for easy GCP pentesting and module creation. 🖥️ Michelle Eggers discusses mainframe tech's relevance and shares five solutions for securing them. 🔒 Karl Fosaaen will delve into the nuanced landscape of Managed Identities across multiple Azure services - and how attackers can exploit access to services with these identities. 🎉 Plus, join in on the fun with a few DEF CON contests hosted by Tib3rius and Philip Young. See you there?! #BlackHatUSA2024 #DEFCON32 #HackerSummerCamp #Pentesting #CTEM #AttackSurfaceManagement #RedTeam #EASM #CAASM #VulnerabilityManagement #CloudSecurity #MainframeSecurity
-
-
Choosing the right Attack Surface Management (ASM) vendor can be daunting. But we’re here to help. Watch our on-demand webinar with GigaOm Analyst Chris Ray to help you navigate through the murky waters: https://ow.ly/i5bg50SxiGy
-
-
At #BlackHatUSA next week, don’t miss your chance to learn how pairing EASM and CAASM can help reduce attack surface sprawl with NetSPI’s CPO Vinay Anand and CTO Tom Parker. See you there? Check out other opportunities to link up with NetSPI at Black Hat: https://ow.ly/5YMm50SxQkh
-
-
The NetSPI team is growing. We’re looking for #engineers in our Pune office. Check out the job descriptions ⬇️ AI Engineering Manager: https://ow.ly/RPv450SMaB3 Lead Sofware Engineer: https://ow.ly/vcle50SMaB4 Software Engineer: https://ow.ly/EMiX50SMaB2 Lead DevOps Engineer: https://ow.ly/RAOb50SMaB1 #hiring #careers #softwareengineer
-
-
Great insight from NetSPI CTO Tom Parker on the CrowdStrike-Microsoft outage from last week ⬇
This weekend looked a little different than last, but many are still navigating the aftermath of the CrowdStrike related IT outages. As the news broke, I was invited to speak with BBC News about the outage and what the cybersecurity industry learn from the situation. We're unable to share the full interview due to licensing, but here are a few highlights from the conversation: ➡ This has been a real exercise in business continuity planning for many. It's important for organizations to be resilient to this sort of outage, regardless of the vendor involved. ➡ It is critical for us to not have sudden, knee jerk reactions (such as changing your EDR vendor, or processes) and keep composed in a time of crisis like this. Lots is still yet to be known about how this played out. ➡ Before this happened, CrowdStrike was a leader in the cybersecurity industry. Today, they still are. And tomorrow they will continue to be. This could happen to anyone. ➡ CrowdStrikes response in handing this crisis and how transparent they choose to be is critical in re-establishing trust. ➡ I think what's important as a consumer of their products is to take a look at how they will rebuild that trust with customers and how they are going to prevent this from happening in the future. Security leaders, what types of conversations are you having, one week post-outage? What questions are you being asked? For more of my take on the incident, check out our detailed write-up on the NetSPI blog: https://lnkd.in/enrfVHYQ #Cybersecurity #BusinessContinuity #CrowdStrike #NetSPI #IndustryInsights
-
-
NetSPI Senior Security Consultant Scott Weston is presenting at #DEFCON32! GCPwn is a python-based framework for pentesting GCP environments. Get a preview of his talk with this blog post and we hope to see you in Vegas next week: https://ow.ly/FbfO50SMusm