Adopted External Attack Surface Management to continuously look at the company’s environment from an attacker’s perspective, discovering all internet‑visible assets and their weaknesses
Moved from periodic, IP‑range‑based scanning to domain‑, DNS‑, and certificate‑driven discovery, automatically tracking new subdomains and cloud endpoints as they appeared.