Resources

Enhance your knowledge in Exposure Management

Explore our comprehensive library of resources designed to empower you with the knowledge and tools needed to strengthen your security strategy.

gradient
Filter
Clear
search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
All
Videos
Reach Security Leader Day: Perspectives from Joshua Jones

A conversation with Joshua Jones, VP of Western Division, Tevora.

All
Videos
Reach Security Leader Day: Panel Discussion

A conversation with Geoff Belknap, Deputy CISO, Microsoft; Raymond Winder, Director of Information Security, Autodesk; Joe Masud, VP of Cyber Security & Engineering, Aristocrat; and Barmak Meftah, Co-Founder & General Partner, Ballistic Ventures.

All
Videos
Reach Security Leader Day: Panel Discussion

A conversation with Geoff Belknap, Deputy CISO, Microsoft; Nicole Perlroth, New York Times Bestselling Author; and Colt Blackmore, Co-Founder & CTO, Reach Security.

All
Videos
Reach on The RSnake Show Demo Day

Trey Ford and RSnake did a great demo day with Reach Security. It blew what little hair RSnake has left back. A person-based risk approach to IT governance and control? Who would have thought of such a thing? Definitely worth a watch if you control security at a large organization.

All
Videos
Reach on NYSE TV

Reach Security CEO & Co-Founder Garrett Hamilton sits down with Trinity Chavez of the NYSE to explore how Reach takes organizations from “architecture to action” with Zero Trust.

All
Blog
What is Security Optimization? How to Find Gaps in Your Stack

True security optimization isn’t about buying more technology; it’s about maximizing the impact of the tools you already have. This means shifting from a reactive, tool-centric approach to a proactive, outcome-driven strategy; one that ensures security investments deliver measurable risk reduction.

All
Blog
What is Configuration Drift? 5 Best Practices for Your Team's Security Posture

Left unchecked, configuration drift increases exposure to cyber threats. Yet, many organizations remain unaware of how much drift has occurred until an audit, incident, or breach exposes the issue. Understanding what configuration drift is, how it happens, and how to prevent it is critical for maintaining a strong security posture.

All
Blog
A Blueprint for Stronger Defenses: MITRE D3FEND

Staying ahead of adversaries is a constant challenge due to the evolving tactics and techniques that they leverage to gain access and achieve their objectives. While frameworks like MITRE ATT&CK have become an industry standard for understanding and discussing adversary behaviors, it can be challenging for defenders to map their own defenses.

No posts found

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.