Blog
/
/
/
/
/
Attack Surface Management – Part 1

In this conversation, Sujit Christy and Imesh Liyanage discuss attack surface management (ASM) and its importance in maintaining a secure and resilient IT environment. They explore the concept of ASM, the monitoring of internal and external attack surfaces, the significance of inventorying assets, and the continuous discovery and monitoring process. The conversation sets the stage for a five-part series on attack surface management, with a focus on identifying and mapping the attack surface in the next episode.

Attack Surface Management – Part 1

Facebook
Twitter
LinkedIn

In this conversation, Sujit Christy and Imesh Liyanage discuss attack surface management (ASM) and its importance in maintaining a secure and resilient IT environment. They explore the concept of ASM, the monitoring of internal and external attack surfaces, the significance of inventorying assets, and the continuous discovery and monitoring process. The conversation sets the stage for a five-part series on attack surface management, with a focus on identifying and mapping the attack surface in the next episode.

Host

Sujit Christy

Guest

Imesh Liyanage