Understanding Improper Asset Management

Photo by Florian Olivo on Unsplash

Introduction

Managing assets in companies where constant changes are taking place in a short period of time, such as in the use of micro services or in cloud computing, where a large number of instances are being launched, can be difficult. Products and micro services may have vulnerabilities in their systems, and organisations may deploy them only to forget to remove them after the task has…

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Our Increased Vulnerability to Hacking

Confusion Between Cyber & Crime Insurance Puts Businesses at Risk

Zinari Token Now Trading on PancakeSwap

Hakka Finance Integrates Chainlink Price Feeds for Settling Hakka Intelligence Prediction Markets

What is Malware?

{UPDATE} Galaxy Trucker Pocket Hack Free Resources Generator

Meet the Startups in OWC’s Batch II: Accelerating Web 3.0 Adoption

Prime Numbers NFTs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

NPST CTF 2021 — WRITE-UP

Promo cover for NPST CTF 2021 write up — by Author

5 Use Cases of Kondukto CLI in CI/CD pipelines

A MacOS Vulnerability Could Lead to Unauthorized User Data — CVE-2021–30970

[Offensive Security] Command and Control with Pupy!!