<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Features Archives - ShadowMap</title>
	<atom:link href="https://shadowmap.com/features/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Mon, 03 Oct 2022 19:58:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>Features Archives - ShadowMap</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Tracking SSO Integrations Across The Organization</title>
		<link>https://shadowmap.com/features/tracking-sso-integrations/</link>
					<comments>https://shadowmap.com/features/tracking-sso-integrations/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 19:58:59 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Features]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4307</guid>

					<description><![CDATA[<p>ShadowMap&#8217;s Attack Surface Management Product creates a real-time tracker of all SSO (Single Sign-On) Integrations across your organisations public footprint. A threat analysis report is generated to raise alerts for unauthorised shadow accounts and non-compliance with implementation best practices. Key Features of ShadowMap &#8211; Tracking SSO Integrations &#38; Threat Analysis Report Compatibility with: Google Workspace, Azure [&#8230;]</p>
<p>The post <a href="https://shadowmap.com/features/tracking-sso-integrations/">Tracking SSO Integrations Across The Organization</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://shadowmap.com/attack-surface-management/">ShadowMap&#8217;s Attack Surface Management Product</a> creates a real-time tracker of all SSO (Single Sign-On) Integrations across your organisations public footprint. A threat analysis report is generated to raise alerts for unauthorised shadow accounts and non-compliance with implementation best practices.</p>
<div id="attachment_4266" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo.jpeg"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-4266" class="wp-image-4266 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-1024x649.jpeg" alt="ShadowMap Executive Cyber Protection Demo" width="1024" height="649" srcset="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-980x621.jpeg 980w, https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-480x304.jpeg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4266" class="wp-caption-text">ShadowMap &#8211; Tracking SSO Integrations</p></div>
<h3>Key Features of ShadowMap &#8211; Tracking SSO Integrations &amp; Threat Analysis Report</h3>
<ul>
<li>Compatibility with: Google Workspace, Azure AD, Office 365, Okta, Cloudflare Access, Duo Security, Auth0, Amazon Cognito, Idento IAM along with internal SAML / OAuth implementations.</li>
<li>Track account information behind each SSO Integration &amp; Raise alerts for unauthorised shadow accounts.</li>
<li>Automated best-practice checks of the SSO implementations to raise alerts for any privacy or security issues.</li>
<li><a href="https://shadowmap.com/dark-web-monitoring-data-breaches/">Track Credentials Leaked on the Internet, Deep-Web &amp; Dark-Web</a> related to your SSO implementations.</li>
<li>Have our <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Experts</a> available on-demand to investigate, analyse and mitigate these critical risks.</li>
</ul>
<h3>Importance of Ensuring Secure SSO (Single Sign-On) Implementation</h3>
<p>A recent study on risks associated with SSO (Single Sign-On) implementations found:</p>
<ul>
<li>25% of the S&amp;P 500 and half of the top 20 most valuable public U.S companies have had at least one SSO credential for sale on the dark web in 2022.</li>
<li>Shared credentials were the most common attack vector used by hackers and responsible for nearly 50% of all cyber attacks.</li>
<li>Logon credentials are a major focus for external attackers (61% of data breaches involve credential data).</li>
<li>With the average enterprise using over 250 cloud apps, the prospect of employees remembering unique, strong passwords for each of them is simply impractical.</li>
<li>Brute force attacks accounted for 31% of all cyberattacks in 2021 and 89% of the organisations interviewed experienced phishing attacks over the past year.</li>
</ul>
<h3>Common Security Vulnerabilities in SSO (Single Sign-On) Implementations</h3>
<ul>
<li>XML injection Attacks</li>
<li>Timing or Expiration Based Attacks</li>
<li>Signature Spoofing and Exclusion Attacks</li>
<li>XXE and XSLT Attacks</li>
<li>SSO Implementation Bypass / Authentication Bypass Attacks</li>
<li>Access Token Misuse or Replay Attacks</li>
<li>Credential Leakage via Referrer Header</li>
<li>Client Secret Leakage</li>
<li>Credential Leakage via Page Content</li>
</ul>
<p>The post <a href="https://shadowmap.com/features/tracking-sso-integrations/">Tracking SSO Integrations Across The Organization</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/tracking-sso-integrations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Threat Police Services</title>
		<link>https://shadowmap.com/features/cyber-threat-police-services/</link>
					<comments>https://shadowmap.com/features/cyber-threat-police-services/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 15:04:20 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[Managed Services]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4272</guid>

					<description><![CDATA[<p>The post <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Services</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Services</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/cyber-threat-police-services/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Executive Cyber Protection</title>
		<link>https://shadowmap.com/features/executive-cyber-protection/</link>
					<comments>https://shadowmap.com/features/executive-cyber-protection/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 13:15:31 +0000</pubDate>
				<category><![CDATA[Brand Protection]]></category>
		<category><![CDATA[Features]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4236</guid>

					<description><![CDATA[<p>Executive Cyber Protection is a part of ShadowMap&#8217;s Brand Protection &#38; Takedowns Product. It helps put a spotlight on any data breaches, accidental data leaks that may impact top management and leadership teams. It triggers an early warning and an automated response to prevent reputational damage to your leadership. Key Features of Executive Cyber Protection [&#8230;]</p>
<p>The post <a href="https://shadowmap.com/features/executive-cyber-protection/">Executive Cyber Protection</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Executive Cyber Protection is a part of <a href="https://shadowmap.com/brand-protection-takedowns/">ShadowMap&#8217;s Brand Protection &amp; Takedowns Product</a>. It helps put a spotlight on any data breaches, accidental data leaks that may impact top management and leadership teams. It triggers an early warning and an automated response to prevent reputational damage to your leadership.</p>
<div id="attachment_4266" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo.jpeg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4266" class="wp-image-4266 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-1024x649.jpeg" alt="ShadowMap Executive Cyber Protection Demo" width="1024" height="649" srcset="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-980x621.jpeg 980w, https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-480x304.jpeg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4266" class="wp-caption-text">ShadowMap Executive Cyber Protection Demo</p></div>
<h3>Key Features of Executive Cyber Protection</h3>
<ul>
<li>Protect your Executive&#8217;s personal, corporate and family accounts from targetted data breaches.</li>
<li>Get notified for any executives impacted by: third-party data breaches, data leaks, dark web mentions, news mentions, social media mentions, etc.</li>
<li>Monitor the dark web, ransomware groups, social media for any chatter related to their emails, phone numbers, usernames, computer names, IP addresses.</li>
<li>Receive a high priority alert as soon as one of your executives is part of a data breach or attack.</li>
<li>Have our <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Experts</a> available on-demand to investigate, analyse and mitigate these critical risks.</li>
</ul>
<h3>Targetted Attacks Against Your CXO Executives?</h3>
<p>A recent study on Data Brokers and Data Breaches found:</p>
<ul>
<li>99% of our executives have their personal information available on more than three dozen online data broker websites, with a large percentage listed on more than 100.</li>
<li>70% of executive profiles found on data broker websites contained personal social media information and photos, most commonly from LinkedIn and Facebook.</li>
<li>40% of online data brokers had the IP address of an executive’s home network.</li>
<li>95% of executive profiles contained personal and confidential information about their family, relatives, and neighbours.</li>
<li>On average, online data brokers maintained more than three personal email addresses for every executive record.</li>
</ul>
<h3>How to enable Executive Cyber Protection In your Dashboard?</h3>
<p>Step 1: Add Executives To Your Dashboard</p>
<div id="attachment_4275" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4275" class="wp-image-4275 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-1024x542.png" alt="Add A New Executive" width="1024" height="542" srcset="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-980x519.png 980w, https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-480x254.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4275" class="wp-caption-text">Add A New Executive</p></div>
<p>Step 2: Add Any Number of Monitoring Fields For Your Executives</p>
<div id="attachment_4281" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4281" class="wp-image-4281 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-1024x590.png" alt="Add Monitoring Fields For Executives" width="1024" height="590" srcset="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-980x565.png 980w, https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-480x277.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4281" class="wp-caption-text">Add Monitoring Fields For Executives</p></div>
<p>Step 3: In a few minutes, data will start getting populated for the executives and alerts will start triggering!</p>
<p>The post <a href="https://shadowmap.com/features/executive-cyber-protection/">Executive Cyber Protection</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/executive-cyber-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
