Surfacing Security cover art

Surfacing Security

Surfacing Security

Written by: Assetnote
Listen for free

About this listen

In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).© 2025 Assetnote Economics
Episodes
  • Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs
    Oct 10 2024

    Running an effective bug bounty program requires balancing an attractive scope and payout to hunters with an attack surface that challenges hunters to do more than automated scans. Program managers want to pay for skillful findings, not automated ones. In this episode, we talk about how ASM helps optimize your bug bounty program.

    Show More Show Less
    38 mins
  • Internet-Wide Recon: Moving Past IP-Centric Approaches
    Oct 2 2024

    In this episode, we discuss the blindspots of IP-centric approaches to asset discovery and the importance of understanding the full attack surface of an organization.

    We unpack the challenges posed by modern cloud architectures, load balancers, and WAFs, and how these can create blind spots in reconnaissance efforts. We also highlight the significance of subdomain data and passive DNS in uncovering hidden attack surfaces that traditional scanning methods might miss.

    We talk about:
    - The limitations of Internet Wide Scanning
    - The importance of breadth and depth in attack surface mapping
    - Real-world examples of blind spots in modern infrastructure
    - The role of DNS and path-based routing in security assessments
    - Insights into IPv6 and its implications for discovery

    For more details about Assetnote's Attack Surface Management Platform, visit https://assetnote.io/

    Show More Show Less
    27 mins
  • Beyond Shadow IT: Understanding the True Attack Surface of Your Software
    Sep 25 2024

    This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software that organizations may not fully understand.

    Join us as we discuss:

    • The origins and implications of shadow IT
    • The challenges of visibility and transparency with third-party vendors
    • Real-world examples of vulnerabilities in critical software, including ServiceNow and IBM's ASPR Fastback
    • The limitations of security questionnaires and self-attestation processes
    • The importance of proactive security measures and effective disclosure processes

    We also share insights from our security research team and discuss how organizations can better manage their attack surfaces to mitigate risks associated with shadow exposure.

    For more details about Assetnote's Attack Surface Management Platform, visit https://assetnote.io/

    Show More Show Less
    45 mins
No reviews yet