“We already manage our vulnerabilities; we perform regular security scans.” If you’re a CIO or CISO, you may have said this before. And it’s a valid point: your tools are likely in place, your analysis cycles are scheduled, and your dashboards are filling up. On the...
At the Cyber-IA expo, Florian Wininger, CTO and co-founder of Cyberwatch, took stock of the current situation and shared his vision of how vulnerability management will evolve in the coming years. In 2025, no fewer than 48,000 CVEs were published, an average of 130...
Do you think you can control your cybersecurity by monitoring your internal infrastructure? It’s a good start, but it’s far from enough! According to a recent study, around 79% of cyber risks lie outside your internal IT perimeter, particularly on the...
Version 15.0 of Cyberwatch has been available since September 29, 2025. This new release brings key enhancements that simplify vulnerability and compliance monitoring while improving the user experience. Feature highlights Track the velocity of your security teams A...
AWS Systems Manager (SSM) allows you to manage your Amazon Web Services resources easily and securely, without the burden of complex infrastructure. In this article, discover how AWS Systems Manager Session Manager allows Cyberwatch to access your cloud assets quickly...
Historically, DevOps is an approach that aims to improve collaboration between developers in order to accelerate application development, deployment, and maintenance cycles. It relies on automation, continuous integration (CI), and continuous deployment (CD) to ensure...