Remove tag rd
article thumbnail

SW Labs | Overview: Attack Surface Management

SC Magazine

Many ASM products do this work for you, automatically tagging assets as Linode or AWS if they are owned by these public cloud providers. Use Cases: Internet Patterns Research Historical Research Asset Discovery 3 rd Party or M&A Due Diligence Attack surface reduction. Is it something we have hosted somewhere?

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

The Location Heatmap provided the capability to drill into the four levels of the conference, including the Expo Hall, lower level (North Conference Center), 2nd Floor and 3 rd Floor. Getting the port status of switches with a given tag with getDeviceSwitchPorts. This also included the Tag for the SSIDs. Network Visibility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat USA 2023 NOC: Network Assurance

Cisco Security

As at Black Hat events in the past, I got to participate in meaningful conversations about the intersection of usage of Cisco and 3 rd party products, tweak our API plans and clearly express the needs we have from our partner technologies to better serve our customers in common. However, it didn’t work.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

It also has support for 3 rd Party products through its API. It provides the user with the date and time the observable was seen in the log, the host that sent the log, and the tag and table names that contain the message. The integration allows querying using IPv4, IPv6, SHA-1, SHA-256, MD5, domain, and URL data types.