Tagged: Defender EASM

EASM vs. PT vs. VM & Defender EASM Approaches

Many times people asked me about the differences between external attack surface management, vulnerability management, and penetration testing. Mostly “What will be the and the right approach to handling security tools alongside the behavior and procedures. While many organization has … Read the rest

The State of External Attack Surface Management

Cybersecurity adores fancy words and buzz…, and you’re in for another joy – ASM, DRP, EASM, CAASM.

This blog post provides additional information on the state of external attack surface management, and it’s related tools and technologies.

Why the External … Read the rest

Defender EASM

Defender EASM Glossary

You’ve probably heard about EASM, External Scan Management, Exposure Management, External Attack Surface, and many other interpretations. But the questions are, is this a tool? A capability? Or just the latest buzzword that nobody understands? The answer is yes for … Read the rest

Microsoft Defender EASM

Seeds & Discovery in Defender EASM

The challenges of managing the modern external attack surface are everyone’s challenge. While most security teams focus on the internal systems and Cloud environments, the external attack surface is exposed to the attackers with no interruptions.

The first and second … Read the rest

Defender EASM

Deploy Defender EASM

The challenges of managing the modern external attack surface are everyone’s challenge. While most security teams focus on the internal systems and Cloud environments, the external attack surface is exposed to the attackers with no interruptions.

The first article focused … Read the rest

EASM 101

Defender EASM 101

If you’re an infosec guy, you probably heard the quotes, “You Need to Know your Assets to Monitor and Defend them” or “You Can’t Protect What You Don’t Know.” Those quotes and related ones were born from the field and … Read the rest