Starving Your Adversaries

Preventing Attackers From Living Off the Land by Slashing Identity Risks

Feb 28, 2022

Starving Your Adversaries

Preventing Attackers From Living Off the Land by Slashing Identity Risks

This white paper was written for Chief Information Security Officers (CISOs) and other cybersecurity management as well as security engineers wanting to better understand the threat of subdomain takeover, what it is, how it works, and how an external attack surface management (EASM) tool plays a major role in thwarting these kinds of threats. Additionally, this paper goes deep into the threat of subdomain takeovers.

Summary

Alissa Knight

Feb 28, 2022

Get to know
Me.

Contact me, let's talk.

Team working in an office watching at a presentation

Get to know
Me.

Contact me, let's talk.

Team working in an office watching at a presentation

Get to know
Me.

Contact me, let's talk.

Team working in an office watching at a presentation
We are currently based in Las Vegas, NV and work remotely.

Timezone (GMT+1)

Stay in the Loop

Stay informed about my latest news, updates by subscribing to our newsletter.

We respect your inbox. No spam, just valuable updates.

Offline

Alissa Knight 10845 Griffith Peak Drive, Floor 2, Las Vegas, NV 89135
(213) 786-1970

© Copyright Alissa Knight 2025

We are currently based in Las Vegas, NV and work remotely.

Timezone (GMT+1)

Stay in the Loop

Stay informed about my latest news, updates by subscribing to our newsletter.

We respect your inbox. No spam, just valuable updates.

Offline

Alissa Knight 10845 Griffith Peak Drive, Floor 2, Las Vegas, NV 89135
(213) 786-1970

© Copyright Alissa Knight 2025

We are currently based in Las Vegas, NV and work remotely.

Timezone (GMT+1)

Stay in the Loop

Stay informed about my latest news, updates by subscribing to our newsletter.

We respect your inbox. No spam, just valuable updates.

Offline

Alissa Knight 10845 Griffith Peak Drive, Floor 2, Las Vegas, NV 89135
(213) 786-1970

© Copyright Alissa Knight 2025