ASM, vendor

6 Ways to Vet Your Next ASM Vendor

Attack surface management (ASM) is a critical security function, and the market for ASM solutions is growing rapidly. However, with the evolution to ASM 2.0, the process of selecting a new ASM ...
Security Boulevard
Fingerprintx Tool: An Internship Project for the Real World

Fingerprintx Tool: An Internship Project for the Real World

Introduction Port fingerprinting can detect specific services running on a network, which makes it useful during penetration tests. It expands visibility into potential attack surfaces and vulnerabilities within the network environment. Over ...
CISA JCDC Announcement, Apple's Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA announces the new Joint Cyber Defense Collaborative (JCDC), the controversy over Apple scanning devices for child sexual abuse material, and Amazon offers you a $10 credit if you enroll your biometric ...

Container Adoption Introduces Efficiency – and Vulnerabilities

The post Container Adoption Introduces Efficiency – and Vulnerabilities appeared first on Digital Defense, Inc ...
Professionally Evil Fundamentals: Introduction

Converting NMAP XML Files to HTML with xsltproc

NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit.  This enables the scan data to be parsed by other tools ...
Professionally Evil Fundamentals: Introduction

Converting NMAP XML Files to HTML with xsltproc

NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit.  This enables the scan data to be parsed by other tools ...

A Brief History of Scanning

We’ve always used scanning to share things important to us—both personal and professional. Scanning lets us preserve and share important information and keep documents, photos, and even sites from disappearing. In celebration ...

Vulnerability Management Program Best Practices

An enterprise vulnerability management program can reach its full potential when it is built on well-established foundational goals.  These goals should address the information needs of all stakeholders, tie back to the ...