UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →

3 min read

The Telemetry Imperative: From Nice-to-Have to Necessity

For years, organizations treated network telemetry as an optional enhancement—useful, but not essential. Security teams focused on firewalls, endpoint detection, and vulnerability scanning, assuming these layers were enough. But as cyber threats...

Read More

3 min read

Mitigating Human Error in K-12 School Cybersecurity With Telemetry

Cybersecurity in schools is often framed as a technology challenge, but the most common point of failure isn’t a firewall misconfiguration or...

Read More

2 min read

Understanding Controls: A Critical Line of Defense in Exposure Management

This is where exposure management comes in. Instead of focusing solely on known vulnerabilities, exposure management provides a comprehensive view of...

Read More

2 min read

Understanding Profile: A Critical Variable in Exposure Management

Attackers are no longer solely exploiting software weaknesses; they’re leveraging misconfigurations, compromised credentials, and gaps in security...

Read More

2 min read

East-West Exposure: The Hidden Risk in Unseen Internal Traffic

In cybersecurity, visibility is everything. Most organizations focus on defending their network perimeter—monitoring inbound and outbound traffic to...

Read More

4 min read

Vulnerability Management: Why It Matters and Why It’s Not Enough

For years, vulnerability management has been considered a core pillar of cybersecurity. It’s a structured approach to identifying, assessing, and...

Read More

3 min read

ADVISORY—Cactus Ransomware Strikes Again: A Sophisticated Social Engineering Threat

Recently, UncommonX analysts identified a new Cactus ransomware attack, which was verified by Threat Research Engineers at Cisco TALOS Threat...

Read More