See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

Building a comprehensive OT asset inventory with CISA guidance and runZero Product

This succinct resource provides a clear, actionable framework for building and maintaining a complete OT asset inventory, which is a foundation for any modern, defensible OT cybersecurity architecture.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Rapid Response
How to find F5 BIG-IP instances
May 5, 2022
Technology vendor F5 recently published information on over 40 vulnerabilities, mostly affecting their BIG-IP line of products.
Product
Your guide to IT asset discovery tools
April 29, 2022
You need to know what’s connected to your network to manage or secure it. Surprisingly, many system administrators still manually update...
Rapid Response
How to find Netatalk instances
April 29, 2022
A critical vulnerability in the Netatalk open source file server software was found in some popular network attached storage (NAS) devices.
Rapid Response
How to find applications & services that use Log4J
April 26, 2022
runZero can help you build an up-to-date asset inventory and search for assets that may be affected by Log4J vulnerabilities, such as Log4shell.
Product
Rumble 2.12 Generate organization reports, create scan templates, synchronize GCP, and invite external users
April 5, 2022
Generate Organization Overview Report for stakeholders, create scan templates to simplify scan management and more.
Rapid Response
How to find Kaspersky AV on your Windows endpoints
March 30, 2022
Late last week, the U.S. Federal Communications Commission announced it had added Russian-based Kaspersky Lab to its Covered List, maintained by...
Life at runZero
runZero and Noetic integrate to automate workflows that solve coverage gaps
March 10, 2022
Lack of visibility, correlation, and automation are major hurdles impeding security vulnerability identification and mitigation. Existing tooling...
Rapid Response
How to find APC assets
March 9, 2022
Researchers at Armis recently published details on three new vulnerabilities affecting cloud-connected APC Smart-UPS devices manufactured by...
Product
Rumble 2.11 Identify outliers, trace network paths, and streamline SSO user provisioning
March 8, 2022
Identify outliers to find misconfigurations, missing patches, and rogue devices and more.
Rapid Response
How to find Zabbix instances
February 18, 2022
Popular monitoring tool Zabbix surfaced in security news this week due to two newly disclosed vulnerabilities.
Rapid Response
How to find Moxa MXview instances
February 15, 2022
Security researchers with Claroty’s Team82 recently published findings of five discovered vulnerabilities in Moxa’s MXview software.
Product
Rumble 2.10 Uncover IPv6 blindspots and manage permissions with user groups
February 8, 2022
Discover IPv6 assets anywhere, group users to easily manage permissions and much more.