Glasgow’s Wonka Fiasco is a Scary Case of AI Abuse
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.
It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective.
The security of an enterprise's surface is paramount in the current era of cloud - but how can companies manage their cloud security posture management and tackle basic misconfigurations?
In this episode of the EM360 Podcast, Chief Research Analyst at IT-Harvest Richard Stiennon speaks to David SooHoo, Director of Product Management at Censys, as the pair discuss:
- Attack surface management vs asset management
- The shift of the cloud
- Zero-day attacks and how to mitigate them
Join 34,209 IT professionals who already have a head start
Meet the panel
Censornet: Newlife Sees Cyber Threats Slashed to Zero
Censornet: How to Safeguard 1,500 Users by Going Beyond Web Security
FileCloud: Connecting Your Content Collaboration and Security Strategy
Censornet: Safeguarding the Most Vulnerable People – and Their Data
Censornet: Protecting Staff in a Perimeter-Free World
Cyber Security & Cloud Congress North America Unveils Esteemed Speaker Lineup
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024
Stratio: Why Data Fabric is the only pathway to enterprise Generative AI
Pentera: Automated Security Validation and Empowering Pen Testing Teams
Ontotext: Demystifying Semantic Standards and Knowledge Graphs