#attack-surface-management

[ follow ]
Information security
fromThe Hacker News
4 days ago

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Teams must reduce unnecessary internet-facing exposure to minimize vulnerability exploitation risk, as time-to-exploit windows are shrinking to hours or minutes.
Information security
fromSecurityWeek
4 days ago

Cybersecurity M&A Roundup: 42 Deals Announced in February 2026

Forty-two cybersecurity M&A deals were announced in February 2026, with major acquisitions focused on AI-driven security, attack surface management, and identity verification capabilities.
Information security
fromThe Hacker News
1 month ago

CTEM in Practice: Prioritization, Validation, and Outcomes That Matter

Continuous Threat Exposure Management continuously identifies, prioritizes, validates, and remediates exploitable exposures to reduce cyber risk across the attack surface.
fromThe Hacker News
2 months ago

The ROI Problem in Attack Surface Management

Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security teams deploy ASM, asset inventories grow, alerts start flowing, and dashboards fill up. There is visible activity and measurable output. But when leadership asks a simple question, " Is this reducing incidents?" the answer is often unclear. This gap between effort and outcome is the core ROI problem in attack surface management, especially when ROI is measured primarily through asset counts instead of risk reduction.
Information security
#cybersecurity
fromSecurityWeek
5 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromTechRadar
6 months ago

Aligning IT and security teams for optimal business success

IT and security teams must collaborate closely to balance employee productivity and innovation with reducing attack surface and securing remote, diverse devices and environments.
[ Load more ]