Resource Hub
Jump to a Section:
Featured Resources
Blogs
-
BlogJunOS and RedPenguin
-
BlogHey, that’s not my server!
-
BlogOn the Internet, Everything Old is Exploitable Again
-
BlogHighway Robbery 2.0: How Attackers Are Exploiting Toll Systems in Phishing Scams
-
BlogInvestigating the Vast World of ICS Coverage: Part 2
-
BlogHow Realistic Is Netflix’s Zero Day?
Ebooks
-
eBookAttack Surface Management 101: Your Guide to Total Visibility in Healthcare
-
eBookThe Anatomy of a Healthcare Breach
-
eBookThink Like An Attacker: A Guide to Financial Services Cloud Security with Attack Surface Management
-
eBookAttack Surface Management 101: Your Guide to Total Visibility in Financial Services
-
eBookAttack Surface Management 101: Your Guide to Total Visibility
-
eBookAttack Surface Management Buyer’s Guide
Reports
-
ReportCensys Recognized in Forrester’s Q1 2025 Report on External Threat Intelligence
-
ReportThe 2024 State of the Internet Report
-
ReportThe Gartner® Hype Cycle™ for Security Operations, 2024 Report
-
ReportForrester Report: The Attack Surface Management Solutions Landscape, Q2 2024
-
ReportOn the Radar: Censys Vertically Integrates Search and EASM
-
ReportForrester Report: Best Practices For Implementing External Attack Surface Management (EASM)
Webinars
-
WebinarThe 2024 State of the Internet Report Webinar
-
WebinarFireside Chat: Securing Healthcare in the Digital Age
-
WebinarTracking Malicious Infrastructure: A Censys Lunch and Learn
-
WebinarThe Role of Internet Exposure in Risk Based Vulnerability Management
-
WebinarVisualizing Your Cyber Terrain: Securing Critical Assets
-
WebinarLunch and Learn: From Exposed OT Assets to Internet Intelligence
One-Pagers
-
One-PagerExecutive Summary: The 2024 State of the Internet Report
-
One-PagerHealthcare Cyber Hygiene Checklist
-
One-PagerCVEs as Risks in Censys ASM
-
One-PagerUnmatched Visibility with Censys Internet Intelligence Platform
-
One-PagerProtect Your Small Business with Censys Attack Surface Management
-
One-PagerSmall Businesses, Big Risks
Case Studies
-
Case StudyHow Major Telecom Provider NOS Reduces Cyber Risk and Investigates Threats with Censys
-
Case StudyTo Build or To Buy?
-
Case StudyHow a European Government Agency Saves Time & Sees More with Censys
-
Case StudySwiss Life Gains Full Clarity with Censys Attack Surface Management
-
Case StudyCitizen Lab Exposes Mercenary Spyware Vendor Candiru using Censys Data
-
Case StudyHow an International Real Estate Company Leverages Censys ASM for Cloud Asset Discovery
Podcasts & Videos
-
VideoCVE Context on Censys Search
-
VideoSaved Query Automation with Censys ASM
-
VideoSearch Tier Community Overview
-
VideoASM JIRA Integration
-
VideoASM Demo: Cert Risks
-
VideoASM Demo: Cloud Connectors
Attack Surface Management Solutions
Learn more