Understanding Improper Asset Management

Photo by Florian Olivo on Unsplash

Introduction

Managing assets in companies where constant changes are taking place in a short period of time, such as in the use of micro services or in cloud computing, where a large number of instances are being launched, can be difficult. Products and micro services may have vulnerabilities in their systems, and organisations may deploy them only to forget to remove them after the task has…

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Sand Water:Dig Sand Diversion Hack Free Resources Generator

I hope the machines learnt their lesson

Casandra cluster setup on plain Ubuntu 14.04 VM’s

AWS documentation ****s: aws:SecureTransport

I thought I came here looking for info about aws:SecureTransport

Domain Name System (DNS) | Network Security

NSA has been spying on our telecos and what can we do to fix it

The Cybersecurity Mindset: 4 Steps to Develop It

SSV Protocol & Implementation Deep Dive

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

Understanding Vulnerability Dependency Management

Top 25 Server-Side Request Forgery (SSRF) Bug Bounty Reports

Introduction to SQL Server Function to Perform Fuzzy Search

Log4j Vulnerability Cheatsheet