July 26, 2023

Going beyond: The cybersecurity tools hindering effective cyber asset management

Each article in this roundup explains the downsides of common tools as they pertain to effective cyber asset management, and how runZero, a complete cyber asset management solution, provides a complete and detailed asset inventory beyond the scope of any tools discussed.

July 18, 2023

The best free network scanners for security teams in 2023

In this article, we compare and contrast several free tools and provide our take on why we believe runZero is best suited for corporate security teams.

July 10, 2023

Why NACs are inadequate for cyber asset management

NACs aren’t the best at asset discovery. Allowing or denying access to the network on Layer 2 is their primary function, but finding everything on your network is a different problem. Let’s examine why.

June 29, 2023

Closing the gap: Power your CMDB with cyber asset management for better ROI

According to Gartner, only 25% of organizations achieve meaningful value with their CMDBs. Let’s dig into why and how a cyber asset management solution can improve the accuracy and fullness of your CMDB data.

June 20, 2023

The limitations of vulnerability scanners for cyber asset management

Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong; crashing devices, providing a backward-looking view, finding phantom assets, among other concerns.

June 8, 2023

The risks of using spreadsheets for cyber asset management

An accurate and full asset inventory is vital for an effective security program. Understand the risks and limits of using spreadsheets to manage cyber assets, and how runZero compares.

May 30, 2023

Why EDR agents are inadequate for cyber asset management

When incident responders find assets that are compromised but can’t find them in the asset inventory, many teams realize that they went down the wrong path; EDR works well for endpoint protection but not asset inventory. Let’s examine why.

April 13, 2023

Asset inventory is foundational to security programs

Asset inventory is the foundation of a strong cybersecurity posture. It is often considered the first step in identifying vulnerabilities and potential risks to your organization’s security.