Remove topic asset-management
article thumbnail

Look for attack surface management to go mainstream in 2022

CSO Magazine

Attack surface management (ASM) is a somewhat confusing topic that starts with a fundamental question: What exactly is the attack surface? In reality, it’s everything—internal assets, external corporate assets, third-party assets, people, everything. Hmm, just another day in the perplexing cybersecurity realm.

Internet 103
article thumbnail

The Security Checklist for Designing Asset Management System Architectures

Heimadal Security

In a previous article, I have broached the topic of Software Asset Management and how it consociates with IT Asset Management. The post The Security Checklist for Designing Asset Management System Architectures appeared first on Heimdal Security Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

Although, the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls—domains, DNS, digital certificates. I like to think of this topic like the electricity that powers our homes.

DNS 182
article thumbnail

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

SecureWorld News

CyCognito has released its semi-annual State of External Exposure Management Report , revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive data, including unsecured APIs and personally identifiable information (PII). Half of these potentially vulnerable web apps are hosted in the cloud.

Mobile 87
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises.

article thumbnail

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

The Last Watchdog

In a keynote address, Omdia’s Eric Parizo, managing prinicipal analyst, and Andrew Braunberg, principal analyst, unveiled an approach they coined as “proactive security.” RBVM solutions don’t merely identify vulnerabilities, it quantifies and prioritizes them, making risk management more strategic. LW: Anything else?

Risk 222
article thumbnail

Asset Management System Frequently Asked Questions and More

Heimadal Security

Designing a functional asset management architecture can be a daunting endeavor if one takes into account all the tasks, sub-tasks, and micro-tasks an IT engineer must perform to set up this intricate contraption. To say that the topic is extensive would be […].