How I got started: Attack surface management

As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any […]

The post How I got started: Attack surface management appeared first on Security Intelligence.

Continue reading How I got started: Attack surface management

How to Manage Cyber Risk During Mergers and Acquisitions

By attracting attention from threat actors, merger and acquisition (M&A) events are a significant source of cyber crime risk. So much so that, according to a 2020 IBM Institute of Business Value study, more than one in three executives said they experienced data breaches that can be attributed to M&A activity during integration. Security ratings, […]

The post How to Manage Cyber Risk During Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading How to Manage Cyber Risk During Mergers and Acquisitions

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an […]

The post Cybersecurity 101: What is Attack Surface Management? appeared first on Security Intelligence.

Continue reading Cybersecurity 101: What is Attack Surface Management?