What is ASM (Attack Surface Management)?

  Рет қаралды 19,925

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 7
@alss9823
@alss9823 2 жыл бұрын
Very clear and articulate explanation 👌
@nperegrine8838
@nperegrine8838 2 жыл бұрын
I respectfully request that form to sign up to learn more I am starting out in this sector..and enjoy your channel so much
@davidbosomworth1735
@davidbosomworth1735 2 жыл бұрын
Interesting, but I think that you also need to talk about the "none tech" parts in particular things like attack simulations similar to the "Cyber Range" that we used to use at IBM it is really important that we don't just make this a glorified VM job, but look at the whole aspect of ASM which has to include detection, remediation and recovery
@nperegrine8838
@nperegrine8838 2 жыл бұрын
Agreed.
@wfenwick
@wfenwick 3 ай бұрын
It's a buzzword to describe something security folks have been doing since the beginning of time. On offense they used to call it scouting and recon . On defense it was called enumerating your perimeter and limiting that perimeter such that you can defend ingress and egress points. We don't need Gartner to add another three-letter acronym to the world to give it credence. The difference is that in cyberspace there are sam eight or nine layers to it, unlike 3D space or battle space where there is space air land and sea to cover.
@karashevf
@karashevf 6 ай бұрын
515
@karashevf
@karashevf 6 ай бұрын
338
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 188 М.
What is the Dark Web? A Guide to the Dark Side of the Internet
9:49
IBM Technology
Рет қаралды 2,2 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
Simon Sinek's Advice Will Leave You SPEECHLESS 2.0 (MUST WATCH)
20:43
Alpha Leaders
Рет қаралды 2,7 МЛН
How I Hacked The US Government Aged 16 | Minutes With | @ladbiblestories
14:16
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Understanding Hackers
10:41
IBM Technology
Рет қаралды 35 М.
What Is an AI Anyway? | Mustafa Suleyman | TED
22:02
TED
Рет қаралды 2 МЛН
How Mandiant Attack Surface Management Works
11:41
Mandiant (Part of Google Cloud)
Рет қаралды 6 М.
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН