Artwork

Inhoud geleverd door Shubham Shah. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shubham Shah of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Beyond Shadow IT: Understanding the True Attack Surface of Your Software

45:18
 
Delen
 

Manage episode 441823688 series 3591933
Inhoud geleverd door Shubham Shah. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shubham Shah of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software that organizations may not fully understand.

Join us as we discuss:

  • The origins and implications of shadow IT
  • The challenges of visibility and transparency with third-party vendors
  • Real-world examples of vulnerabilities in critical software, including ServiceNow and IBM's ASPR Fastback
  • The limitations of security questionnaires and self-attestation processes
  • The importance of proactive security measures and effective disclosure processes

We also share insights from our security research team and discuss how organizations can better manage their attack surfaces to mitigate risks associated with shadow exposure.

For more details about Assetnote's Attack Surface Management Platform, visit https://assetnote.io/

  continue reading

11 afleveringen

Artwork
iconDelen
 
Manage episode 441823688 series 3591933
Inhoud geleverd door Shubham Shah. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shubham Shah of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software that organizations may not fully understand.

Join us as we discuss:

  • The origins and implications of shadow IT
  • The challenges of visibility and transparency with third-party vendors
  • Real-world examples of vulnerabilities in critical software, including ServiceNow and IBM's ASPR Fastback
  • The limitations of security questionnaires and self-attestation processes
  • The importance of proactive security measures and effective disclosure processes

We also share insights from our security research team and discuss how organizations can better manage their attack surfaces to mitigate risks associated with shadow exposure.

For more details about Assetnote's Attack Surface Management Platform, visit https://assetnote.io/

  continue reading

11 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding