In this article

Finding Rogue Assets in Attack Surface Management (Video)