Strategies and Techniques for Safeguarding Your Digital Assets
Ron Eddings and MJ Kaufmann

#ASM
#attack
#AI
#cybersecurity
🛡️ مدیریت سطح حمله (ASM): خط مقدم دفاع سایبری
🏢 با گسترش سطح حمله و تکامل مداوم تهدیدهای سایبری، سازمانها بیش از هر زمان دیگری آسیبپذیر شدهاند. رسیدگی به این تهدیدها حیاتی است و مدیریت سطح حمله (ASM) را به یک ضرورت جهانی برای رهبران امنیتی تبدیل کرده است. این کتاب عملی و جامع، شما را در تسلط بر ASM همراهی میکند.
✍️ نویسندگان: ران ادینگز و امجی کافمن
این دو متخصص با رویکردی کاربردی و بهرهگیری از تکنیکهای هوش مصنوعی و یادگیری ماشین، راهکارهایی برای مبتدیان و حرفهایها ارائه میدهند. از شبکهها و سیستمهای ابری گرفته تا عوامل انسانی، ASM شما را قادر میسازد داراییهای دیجیتال را بهطور مستمر ارزیابی کرده و بینشی کامل نسبت به آسیبپذیریها و تهدیدهای بالقوه به دست آورید.
📖 آنچه خواهید آموخت:
🚀 ASM چیزی فراتر از یک استراتژی است—این یک مکانیزم دفاعی در برابر تهدیدهای سایبری رو به رشد است.
این کتاب به شما کمک میکند تا سپر دفاع دیجیتال خود را مستحکمتر کرده و آمادگی کامل در برابر تهدیدهای نوظهور داشته باشید.
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors.
Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance.
You'll learn:
ASM is more than a strategy—it's a defense mechanism against growing cyber threats. This guide will help you fortify your digital defense.
Table of Contents
Part I. Foundations of ASM
Chapter 1. Laying the Groundwork: An Overview of Attack Surface Management
Chapter 2. Types of Attack Surfaces
Chapter 3. How the Attack Surface Relates to Risk
Part II. Identification and Classification
Chapter 4. Identification and Classification of Assets
Chapter 5. Automating Asset Discovery
Part III. Prioritization and Remediation
Chapter 6. Prioritization and Crown Jewel Analysis
Chapter 7. Measuring Attack Surface
Chapter 8. Remediation
Part IV. Adapting and Monitoring
Chapter 9. Minimizing Attack Surfaces
Chapter 10. Continuous Monitoring and Management
Chapter 11. The Future of Attack Surface Management
About the Author
Ron Eddings is the Co-Founder and Executive Producer at Hacker Valley Media. Ron holds expertise across the cybersecurity domain with over 15 years of experience. His passion for making cybersecurity accessible and entertaining has established him as an influential voice in the industry. With hands-on mastery across IT and security, his career has spanned consulting at top firms like Booz Allen Hamilton and security architecture roles at Intel Corporation and Palo Alto Networks.
Ron's writing and perspectives have been featured in notable publications, including Dark Reading, The CyberWire, and Black Hat. He continues to push the boundaries of edutainment through initiatives like Hacker Valley Studio, bringing cybersecurity into mainstream entertainment.
MJ Kaufmann is the Founder and Principal Consultant at Write Alchemist. She holds a Master's in Information Security (MSIS). Her passion and vision have solidified her as a trusted authority in cybersecurity content. With over two decades of practical IT expertise, her experience ranges from trailblazing enterprise-level projects to ghostwriting for global tech giants and shaping the next generation of IT professionals. Her hands-on technology mastery includes architecting applications, pioneering system designs, and deploying enterprise-grade solutions.
As a college professor, MJ taught programming and cybersecurity courses. She championed the importance of cybersecurity education, resulting in the creation of both an Associate's and Bachelor's degree programs in cybersecurity.
As a content and product marketing consultant specializing in technology and cybersecurity, her ghostwritten work has been published in respected magazines such as Forbes and Dark Reading. Her articles are published in industry publications like Helpnet Security, Network Computing, and Security Magazine.









