Resource Hub
Jump to a Section:
Featured Resources
Blogs
-
BlogMassive FortiGate Config Leak: Assessing the Impact
-
BlogHow the New White House Executive Order Can Up-Level the U.S. Cyber Game
-
BlogWill the Real Volt Typhoon Please Stand Up?
-
BlogHow Censys Search Helps Prevent Phishing Attacks by Monitoring SSL/TLS Certificates
-
BlogCybersecurity Predictions for 2025: Navigating AI, Threat Profiling, and Industry Transformation
-
BlogHomelab and Break Things
Ebooks
-
eBookThe Anatomy of a Healthcare Breach
-
eBookThink Like An Attacker: A Guide to Financial Services Cloud Security with Attack Surface Management
-
eBookAttack Surface Management 101: Your Guide to Total Visibility in Financial Services
-
eBookAttack Surface Management 101: Your Guide to Total Visibility
-
eBookAttack Surface Management Buyer’s Guide
-
eBookThe Censys Threat Busters and the Malware Slime Showdown
Reports
-
ReportThe 2024 State of the Internet Report
-
ReportThe Gartner® Hype Cycle™ for Security Operations, 2024 Report
-
ReportForrester Report: The Attack Surface Management Solutions Landscape, Q2 2024
-
ReportOn the Radar: Censys Vertically Integrates Search and EASM
-
ReportForrester Report: Best Practices For Implementing External Attack Surface Management (EASM)
-
ReportThe 2024 State of Threat Hunting Report
Webinars
-
WebinarThe 2024 State of the Internet Report Webinar
-
WebinarFireside Chat: Securing Healthcare in the Digital Age
-
WebinarTracking Malicious Infrastructure: A Censys Lunch and Learn
-
WebinarThe Role of Internet Exposure in Risk Based Vulnerability Management
-
WebinarVisualizing Your Cyber Terrain: Securing Critical Assets
-
WebinarLunch and Learn: From Exposed OT Assets to Internet Intelligence
One-Pagers
-
One-PagerExecutive Summary: The 2024 State of the Internet Report
-
One-PagerHealthcare Cyber Hygiene Checklist
-
One-PagerCVEs as Risks in Censys ASM
-
One-PagerUnmatched Visibility with Censys Internet Intelligence Platform
-
One-PagerProtect Your Small Business with Censys Attack Surface Management
-
One-PagerSmall Businesses, Big Risks
Case Studies
-
Case StudyHow Major Telecom Provider NOS Reduces Cyber Risk and Investigates Threats with Censys
-
Case StudyTo Build or To Buy?
-
Case StudyHow a European Government Agency Saves Time & Sees More with Censys
-
Case StudySwiss Life Gains Full Clarity with Censys Attack Surface Management
-
Case StudyCitizen Lab Exposes Mercenary Spyware Vendor Candiru using Censys Data
-
Case StudyHow an International Real Estate Company Leverages Censys ASM for Cloud Asset Discovery
Podcasts & Videos
-
VideoCVE Context on Censys Search
-
VideoSaved Query Automation with Censys ASM
-
VideoSearch Tier Community Overview
-
VideoASM JIRA Integration
-
VideoASM Demo: Cert Risks
-
VideoASM Demo: Cloud Connectors
Attack Surface Management Solutions
Learn more