Security News > 2022 > February > How Attack Surface Management Preempts Cyberattacks
The wide-ranging adoption of cloud facilities and the subsequent mushrooming of organizations' networks, combined with the recent migration to remote work, had the direct consequence of a massive expansion of organizations' attack surface and led to a growing number of blind spots in connected architectures.
The unforeseen results of this expanded and attack surface with fragmented monitoring has been a marked increase in the number of successful cyber-attacks, most notoriously, ransomware, but covering a range of other types of attacks as well.
This is where emerging technologies such as Attack Surface Management can be invaluable.
Advanced ASM includes actionable mitigation recommendations for each uncovered security gap, recommendations ranging from cleaning up unused and unnecessary assets to reduce the attack surface to warning individuals that their email address is readily available and might be leveraged for phishing attacks.
ASM includes reporting on Open-Source Intelligence that could be used in a social engineering attack or a phishing campaign, such as personal information publicly available on social media or even on material such as videos, webinars, public speeches, and conferences.
An ASM solution associated with a reactive suite such as Endpoint Detection and Response is more likely to me based on expanded scanning abilities, whereas an ASM solution included into a proactive platform such as Extended Security Posture Management is more likely to be focused on leveraging scanning capabilities to expand on emulating cyber-attackers' recon techniques and tooling.
News URL
https://thehackernews.com/2022/02/how-attack-surface-management-preempts.html