Once upon a time, conducting a device inventory was as simple as walking through the office and ticking off the number of computers you had. Nowadays, that sounds like a fairy tale. Today, that same inventory requires tracking down each device used to access your company’s systems or information by every single employee. It’s no longer a carefree magical journey — it’s a … [Read more...] about So many assets, so little visibility: Today’s device inventory challenges
Features
Security basics: If you can’t make them sexy, make them simple
I’m a huge fan of the CISO/Security Vendor Relationship Podcast, and one episode featured a great conversation about how security teams really want a way to consistently execute on security basics rather than buying narrow technologies focused on the edge. NARROW AND EXCITING VS. BROAD AND BORING First, Justin Berman, now Head of Security at Dropbox: “I think that … [Read more...] about Security basics: If you can’t make them sexy, make them simple
Work-from-home has huge, built-in security challenges
Historically, corporations that had established work-from-home programs using company-supplied hardware and software had a limited number of security issues that needed to be managed for their employees. Since the employees used company-owned and preconfigured systems, the employer had the opportunity to create a controlled environment for their remote users. Then along came … [Read more...] about Work-from-home has huge, built-in security challenges
Building a Better Asset Management Program
Network vulnerabilities are everywhere — to find them you simply have to keep your eyes open. But vulnerabilities don’t live in a vacuum, they often occur in conjunction with some other IT security policy or procedure violation, creating a multilayer challenge for the security team. Recently, Atuf Ghauri, the cybersecurity practice lead at the accounting/consulting firm … [Read more...] about Building a Better Asset Management Program
What, why, and how of cybersecurity asset management
How can we secure an IT resource if we don’t know that it exists or if we don’t have visibility into its state? To quote respected industry practitioner Adrian Sanabria, “Most security and IT problems begin with visibility.” Security practitioners crave visibility into the state of laptops, vices, virtual machines, applications, and users in their … [Read more...] about What, why, and how of cybersecurity asset management