As a security practitioner, you can’t protect what you can’t see. Censys discovers and inventories Internet assets including storage buckets, IPs, domains, certificates, and software living in the cloud and on-premise. The proprietary attribution algorithms that Censys uses to identify potentially unknown Internet assets that affect your cybersecurity posture may seem like a black box.
This talk aims to shed light on how our attribution technology works and provides valuable insights to organizations on how they can use the Censys Attack Surface Management (ASM) Platform to save time, reduce costs, and produce confident results with less noise than competitors.
Michael Lopez, Senior Software Engineer