July 26, 2023

The cybersecurity tools inefficient for CAASM

Each article in this roundup explains the downsides of common tools as they pertain as effective CAASM solutions, and how runZero, a complete CAASM platform, provides a complete and detailed asset inventory beyond the scope of any tools discussed.

July 18, 2023

Asset inventory in higher education is a PhD-level problem

Universities have more complexity and less control than a company with a collection of offices. So they need cybersecurity tools and services to handle various devices and environments. We explore the many problems and actions institutes need to take.

July 18, 2023

The best free network scanners for security teams in 2023

In this article, we compare and contrast several free tools and provide our take on why we believe runZero is best suited for corporate security teams.

July 10, 2023

Why NACs are inadequate for cyber asset attack surface management

NACs aren’t the best at asset discovery. Allowing or denying access to the network on Layer 2 is their primary function, but finding everything on your network is a different problem. Let’s examine why.

June 29, 2023

Closing the gap: Power your CMDB with CAASM for better ROI

According to Gartner, only 25% of organizations achieve meaningful value with their CMDBs. Let’s dig into why and how a CAASM solution can improve the accuracy and fullness of your CMDB data.

June 20, 2023

The limitations of vulnerability scanners for cyber asset attack surface management

Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong; crashing devices, providing a backward-looking view, finding phantom assets, among other concerns.

June 8, 2023

The risks of using spreadsheets for cyber asset attack surface management

An accurate and full asset inventory is vital for an effective security program. Understand the risks and limits of using spreadsheets to manage cyber assets, and how runZero compares.

May 30, 2023

Why EDR agents are inadequate for cyber asset attack surface management

When incident responders find assets that are compromised but can’t find them in the asset inventory, many teams realize that they went down the wrong path; EDR works well for endpoint protection but not asset inventory. Let’s examine why.

November 22, 2022

A 365-degree view of your Microsoft environment

As the scope of corporate networks has been constantly expanding over time, the challenge of maintaining an accurate asset inventory and effectively identifying unmanaged assets has only grown. In addition to on-premise environments, IT and security teams also have to keep …

Read More

November 3, 2022

Which discovery approach works best for unmanaged devices?

Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain potential footholds onto the network. Which discovery approaches are the most effective at finding unmanaged devices?