Request for submitting an IDEA
With all new technologies in place, we still see latency across the board with medium scale servers and at tim...
•
With all new technologies in place, we still see latency across the board with medium scale servers and at tim...
For the best results using Mandiant Attack Surface Management, add the following IP addresses to your allowlis...
Recently questions have come up related to the discovery context entry of internet archive database and what t...
Since keywords may find things not related to your actual organization entities found are marked out of scope ...
ver AWS resources that were affected by the CrowdStrike Falcon agent?On July 18th 2024, an update to the Crowd...
To enhance the scalability and performance of the Mandiant ASM Discovery Engine, we are expanding our scanner ...
Previously, when performing API calls to capture entities (/v1/search/entities/), there were two filters which...
If you have a collection where you expect not to find a specific technology you can create a technology policy...
In order to change the severity of an issue for a collection you can go to the collection settings and under i...
After an Issue has been seen in a scan it will show in the collection settings. Only after that, an Issue can ...
For Collections configured with high number of seeds and resulting in many entities, there will be a big numbe...
By default, Mandiant ASM (Attack Surface Management) has a focused approach to identifying assets for testing....
In this brief post, we'll take a closer look at the Library in Attack Surface Management (ASM). In ASM you hav...
This guide will use Python to connect to ASM via API to create and/or delete. The script will contain a menu w...
The following two examples can be used as a reference for basic calls to the ASM API. In both examples, the ke...
I'd like to know if ASM SaaS is vulnerable to the following critical vulnerabilities(specifically, if ASM util...
We are excited to announce the availability of Google Cloud Security Customer Success subscriptions. Optimize ...
We have a webinar, Living on the Edge: Investigating Ivanti Connect Secure VPN Zero-Day Exploits coming up thi...
Is there a good explanation why some inferred CVEs come without a reference to (MA)TI Threat Intelligence when...
Mandiant Attack Surface Management 30-day free trial https://www.mandiant.com/attack-surface-management-free-t...