Industry


Industry
Why an integrations-only approach isn't enough for full asset inventory - Part 3
February 8, 2023
Your CAASM may not be enough to help you meet the requirements outlined by CISA BOD 23-01. Learn why you need more than just API integrations for...
Industry
Single source of truth? The truth about CMDBs
January 31, 2023
Are you using a Configuration Management Database (CMDB) for IT asset inventory? The truth is that it's not enough to cover all your bases. You...
Industry
Why vulnerability scanners cannot provide comprehensive asset inventory - Part 2
January 18, 2023
Vulnerability scanners use checks to test for specific CVEs. They were not built with asset inventory in mind. Vulnerability scanners typically...
Industry
Why runZero is the best way to fulfill CISA BOD 23-01 requirements for asset visibility - Part 1
January 11, 2023
CISA BOD 23-01 requires better asset inventory and vulnerability management practices. This six-part series dives into why runZero is the best...
Industry
CISA BOD 23-01: Why vulnerability scanners miss the mark on asset inventory
December 21, 2022
Most agencies will attempt to leverage existing solutions, like their vulnerability scanners, to build their asset inventories. It seems reasonable...
Industry
CISA BOD 23-01 requires asset visibility and vulnerability detection as foundational requirements
November 22, 2022
CISA released the BOD 23-01 in an effort to stengthen the national security posture with new asset inventory and vulnerability management...
Industry
Which discovery approach works best for unmanaged devices?
November 3, 2022
Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain...
Industry
Why unmanaged devices are a challenge for IT and security programs
October 18, 2022
Why do unmanaged devices matter? We discuss the importance of knowing about the unmanaged devices on your network, highlight some issues stemming...
Industry
Shadow IT what’s lurking on your network?
June 22, 2022
Shadow IT poses an immense risk to the security of organizations around the world, but few teams feel prepared to tackle the problem. A Deloitte...
© Copyright 2024 runZero, Inc. All Rights Reserved