انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Can We Make Attack Surface Management … Fun? | Chaos Lever
Manage episode 448932486 series 3378962
In today’s episode, we’re diving into one of IT’s murkiest topics: Attack Surface Management, or ASM. Can ASM be fun? Maybe. Is it critical for modern security? Absolutely. If you’ve ever wondered what ASM actually does, or why it’s more than just the latest buzzword, we’ve got answers (and helping handfuls of snark).
We explore how ASM helps businesses stay on top of their digital perimeters—those tricky-to-manage spaces outside the traditional data center walls. From spotting exposed IPs and misconfigured servers to reining in shadow IT, ASM aims to give organizations continuous visibility into their “attack surface.” And while ASM can’t replace yearly pen tests or manage itself like a SOAR, it’s an invaluable tool for identifying vulnerabilities before hackers do.
Join us as we untangle ASM’s purpose, benefits, and its place in a security stack alongside tools like SIEM and SOAR. Could ASM be your best defense against hidden threats? Tune in to find out! And remember, in security, making the news is rarely a good thing.
LINKS:
- Gartner’s Insights into Attack Surface Management (https://www.gartner.com/en/documents/5341663)
- BlueKeep: Still Crazy (Good at Being Used for Hacking RDP) After All These Years (https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-168a)
206 حلقات
Manage episode 448932486 series 3378962
In today’s episode, we’re diving into one of IT’s murkiest topics: Attack Surface Management, or ASM. Can ASM be fun? Maybe. Is it critical for modern security? Absolutely. If you’ve ever wondered what ASM actually does, or why it’s more than just the latest buzzword, we’ve got answers (and helping handfuls of snark).
We explore how ASM helps businesses stay on top of their digital perimeters—those tricky-to-manage spaces outside the traditional data center walls. From spotting exposed IPs and misconfigured servers to reining in shadow IT, ASM aims to give organizations continuous visibility into their “attack surface.” And while ASM can’t replace yearly pen tests or manage itself like a SOAR, it’s an invaluable tool for identifying vulnerabilities before hackers do.
Join us as we untangle ASM’s purpose, benefits, and its place in a security stack alongside tools like SIEM and SOAR. Could ASM be your best defense against hidden threats? Tune in to find out! And remember, in security, making the news is rarely a good thing.
LINKS:
- Gartner’s Insights into Attack Surface Management (https://www.gartner.com/en/documents/5341663)
- BlueKeep: Still Crazy (Good at Being Used for Hacking RDP) After All These Years (https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-168a)
206 حلقات
所有剧集
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.