In this episode, we discuss the blindspots of IP-centric approaches to asset discovery and the importance of understanding the full attack surface of an organization.
We unpack the challenges posed by modern cloud architectures, load balancers, and WAFs, and how these can create blind spots in...
Published 10/02/24
This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software...
Published 09/25/24