UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →

Cybersecurity

3 min read

The Telemetry Imperative: From Nice-to-Have to Necessity

For years, organizations treated network telemetry as an optional enhancement—useful, but not essential. Security teams focused on firewalls,...

Read More

3 min read

Mitigating Human Error in K-12 School Cybersecurity With Telemetry

Cybersecurity in schools is often framed as a technology challenge, but the most common point of failure isn’t a firewall misconfiguration or...

Read More

2 min read

Understanding Controls: A Critical Line of Defense in Exposure Management

This is where exposure management comes in. Instead of focusing solely on known vulnerabilities, exposure management provides a comprehensive view of...

Read More

2 min read

Understanding Profile: A Critical Variable in Exposure Management

Attackers are no longer solely exploiting software weaknesses; they’re leveraging misconfigurations, compromised credentials, and gaps in security...

Read More

2 min read

East-West Exposure: The Hidden Risk in Unseen Internal Traffic

In cybersecurity, visibility is everything. Most organizations focus on defending their network perimeter—monitoring inbound and outbound traffic to...

Read More

4 min read

Vulnerability Management: Why It Matters and Why It’s Not Enough

For years, vulnerability management has been considered a core pillar of cybersecurity. It’s a structured approach to identifying, assessing, and...

Read More

3 min read

ADVISORY—Cactus Ransomware Strikes Again: A Sophisticated Social Engineering Threat

Recently, UncommonX analysts identified a new Cactus ransomware attack, which was verified by Threat Research Engineers at Cisco TALOS Threat...

Read More