Frequently asked questions
Answers to commonly asked questions about our platform
CyberSAM uses passive and active techniques. We start from your root domain, collecting data from public sources (e.g. certificate logs, DNS records) and actively explore linked assets to identify the full attack surface.