• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

Cybersecurity
Asset ManagementPRESENTED BY

  • Home
  • Features
  • Video
  • Resources

Featured

Normalizing your COVID-induced digital transformation

By Stephen Lawton

When we began this journey nearly six months ago, COVID-19 was just starting to get out of control and the various state shutdowns were on the distant horizon. While the scientists and medical professionals tell us we are still in the first wave of the pandemic with records numbers of new cases reported almost daily, many states are starting to re-open operations, schools are … [Read more...] about Normalizing your COVID-induced digital transformation

IT asset management vs. cybersecurity asset management

By Noah Simon

“How is IT asset management different from cybersecurity asset management?” We hear this question a lot — and rightfully so.  There’s significant overlap of responsibilities between IT asset management (ITAM) and cybersecurity asset management.  Yet, these core functions ultimately have different objectives, and often are carried out by different teams. IT … [Read more...] about IT asset management vs. cybersecurity asset management

Q&A: Asset management and risk

By SC Contributor

In this installment of the Axonius Q&A series, CISO Lenny Zeltser discusses how IT asset management impacts risk management.  SC Media: Obviously knowing what your assets are, where they reside, and their lifecycle status are a key part in resource planning. Let’s look at how this impacts risk management. How does asset management play in the overall risk and compliance … [Read more...] about Q&A: Asset management and risk

Managing data compliance and workflows

By Ed Tittel

As companies meet increasingly stringent compliance regulations, the stresses on IT asset management also escalates. This raises two important questions: Can a company fully document its workflow from one asset to another? Can a company be sure that that personally identifiable information (PII), personal health information (PHI) and other protected data is not moving through … [Read more...] about Managing data compliance and workflows

Why unmanaged device discovery is critical for asset management programs

By Noah Simon

Unmanaged devices present significant security risks for organizations. When these devices are left unidentified, and they’re unprotected, they provide attackers with an entry point into a corporate network. Once these devices have been compromised, it can allow for lateral movement to other machines that may have sensitive data residing on them. With so many connected … [Read more...] about Why unmanaged device discovery is critical for asset management programs

Next Page »

Primary Sidebar

The asset management challenge

Tweets by AxoniusInc

Footer

Cybersecurity Asset Management is a partnership between Axonius and SC Media. Its mission is to highlight best practices, thought leadership and important trends related to IT asset management’s evolving role in cybersecurity.

SC Media is cybersecurity. For 30 years SC Media armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, custom research, and independent product reviews in partnership with and for top-level information security executives and their technical teams.

Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

Contact Us

© 2020 Axonius & SC Media