Book description
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors.
Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance.
You'll learn:
- Fundamental ASM concepts, including their role in cybersecurity
- How to assess and map your organization's attack surface, including digital assets and vulnerabilities
- Strategies for identifying, classifying, and prioritizing critical assets
- Attack surfaces types, including each one's unique security challenges
- How to align technical vulnerabilities with business risks
- Principles of continuous monitoring and management to maintain a robust security posture
- Techniques for automating asset discovery, tracking, and categorization
- Remediation strategies for addressing vulnerabilities, including patching, monitoring, isolation, and containment
- How to integrate ASM with incident response and continuously improve cybersecurity strategies
ASM is more than a strategy—it's a defense mechanism against growing cyber threats. This guide will help you fortify your digital defense.
Publisher resources
Table of contents
- Brief Table of Contents (Not Yet Final)
- I. Attack Surface Management Basics
- 1. Laying the Groundwork: An Overview of Attack Surface Management
- 2. Types of Attack Surfaces
- 3. How the Attack Surface Relates to Risk
- II. Identification and Classification
- 4. Identification and Classification of Assets
- 5. Automating Asset Discovery
- III. Prioritization and Remediation
- 6. Prioritization and Crown Jewel Analysis
Product information
- Title: Attack Surface Management
- Author(s):
- Release date: May 2025
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098165086
You might also like
book
Moving from Vulnerability Management to Exposure Management
Exposure management is a set of processes that gives enterprises the awareness to continually and consistently …
article
Three Ways to Sell Value in B2B Markets
As customers face pressure to reduce costs while maintaining profitability, value-based selling (VBS) has become critical …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
article
Communicate with Teams More Effectively
This selection of shortcuts will enable you to improve your communication, critical thinking, documentation, and networking …